Search Results - (( re estimation methods algorithm ) OR ( based information ((a algorithm) OR (_ algorithm)) ))
Search alternatives:
- estimation methods »
- methods algorithm »
- based information »
- re estimation »
- a algorithm »
-
1
Segmentation of MRI brain images using statistical approaches
Published 2011“…Also, a filter-based image inhomogeneity-correction algorithm is proposed which uses the maximum filter for inhomogeneity field estimation. …”
Get full text
Get full text
Thesis -
2
Robust Kernel Density Function Estimation
Published 2010“…To remedy this problem, Kim and Scott (2008) proposed an Iteratively Re-weighted Least Squares (IRWLS) algorithm for Robust Kernel Density Estimation (RKDE). …”
Get full text
Get full text
Thesis -
3
Energy, Vibration And Sound Research Group (e-VIBS) School Of Science And Technology Universiti Malaysia Sabah : Bioacoustics Signal Modeling Using Time-Frequency Distribution
Published 2011“…In term of that, bioacoustics has been introduced as a beneficial method for local species richness estimation. …”
Get full text
Get full text
Get full text
Research Report -
4
Channel quality information (CQI) reporting algorithms in LTE-A
Published 2016“…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Moreover, both dynamic and static information are handled by the solution. In static case, the resource information such as a number of CPUs of a machine, CPU speed, a number machine in the grid system is significantly known in advance while dynamic information like the arrival jobs that are submitted to the system any time during simulation. …”
Get full text
Get full text
Article -
9
-
10
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Guaranteeing anonymous usage of location-based services however requires that the precise location information transmitted by a user cannot be easily used to identify the subject. …”
Get full text
Get full text
Thesis -
11
Adaptive firefly algorithm for hierarchical text clustering
Published 2016“…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
Get full text
Get full text
Get full text
Thesis -
12
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
13
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…This shows that the algorithm has a high accuracy in extracting secret information. …”
Get full text
Get full text
Get full text
Article -
14
Efficient Entropy-Based Decoding Algorithms For Higher-Order Hidden Markov Model
Published 2019“…This algorithm is a memory-efficient algorithm due to its required memory space that is time independent. …”
Get full text
Get full text
Thesis -
15
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
16
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
17
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…The objectives this research are to investigate hybrid algorithm in game generator, to develop Sudoku generator based on hybrid algorithm and lastly to test and evaluate the Sudoku generator using time comparison. …”
Get full text
Get full text
Thesis -
20
