Search Results - (( re estimation methods algorithm ) OR ( field communication system algorithm ))

Refine Results
  1. 1

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…Also, a filter-based image inhomogeneity-correction algorithm is proposed which uses the maximum filter for inhomogeneity field estimation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Improving Photometric Redshifts By Varying Activation Functions In Artificial Neural Networks by Pathi, Imdad Binti Mahmud

    Published 2024
    “…The Artificial Neural Network Redshift (annz) algorithm is a fast and simple machine learning photometric redshift estimator. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
    Article
  7. 7

    Robust estimation methods for fixed effect panel data model having block-concentrated outliers by Abu Bakar @ Harun, Nor Mazlina

    Published 2019
    “…The Ordinary Least Squares (OLS) is the commonly used method to estimate the parameters of fixed effect panel data model. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.

    Published 2023
    “…The crypto-algorithm has been implemented within an environment of microprocessor system on a XILINX Field Programmable Logic Arrays chip. …”
    Conference Paper
  9. 9
  10. 10

    Malaysia solar energy experience: intelligent fault location algorithm for unbalanced radial distribution network including PV systems by Farzan, Payam, Izadi, Mahdi, Gomes, Chandima, Hesamian, Mohammad Hesam

    Published 2016
    “…The recorded values are evaluated by a designed and tuned multi-layer feed forward neural network and the fault distances from the source are estimated accordingly. In order to highlight the accuracy of the presented method, the scenario is also repeated by recording the peak values of short circuit current which have been mostly used in the published intelligent fault location studies and the obtained results via two different values are compared with each other. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Robust variable selection methods for large- scale data in the presence of multicollinearity, autocorrelated errors and outliers by Uraibi, Hassan S.

    Published 2016
    “…In this situation, the existing Elastic-Net and RE-Net methods are not capable of selecting the important variables in the final model. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automated Scaling Region of Interest with Iterative Edge Preserving in Forward-Backward Time-Stepping by Juliana, Binti Nawawi

    Published 2019
    “…Average RE is 61.94% for a circular shape in breast model, meanwhile attains RE of 4.17% for a U-shape object. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Adaptive Noise Cancellation Systems using Selectable Algorithm by Roshahliza, M. Ramli, Salina, Abdul Samad

    Published 2016
    “…The book targets DSP designers, researchers and postgraduate students in the field of DSP for mobile communication systems. The book provides analysis of the results obtained from subjecting the developed system to environmental noise.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    An improved public key cryptography based on the elliptic curve by Al-Daoud, Essam Faleh

    Published 2002
    “…Meanwhile, the size of the public keys are reduced by 37 to 48 percent. The improved algorithms are applied to the on-line and off-line electronic payments systems, which lead to probably the best solution to reduce the objects size and enhance the performance in both systems.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Field theory analysis for wireless infrared system's error correction by Jatoi, M.A., Kamel, N., Ousta, F., Gardezi, S.J.S.

    Published 2014
    “…This paper provides a brief account on field theory used for error correction in wireless infrared systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm by Nejad, Mohsen Fadaee

    Published 2013
    “…Among these methods, Genetic Algorithm and Particle Swarm Optimization are known as two most effective methods for HRESs. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improved Boosted Decision Tree Algorithms by Adaptive Apriori and Post-Pruning for Predicting Obstructive Sleep Apnea by Sim, Doreen Ying Ying, Teh, Chee Siong, Ahmad Izuanuddin, Ismail

    Published 2018
    “…The novelty of the post-pruning technique applied is that it is augmented by AA properties and these depend on the data characteristics in the dataset(s) being accessed. This algorithm is then boosted by using AdaBoost ensemble method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Cloud Computing systems are widely applied in many fields such as communication data management, web application, network monitoring, financial management and so on. …”
    Get full text
    Thesis