Search Results - (( using function ((method algorithm) OR (max algorithm)) ) OR ( java applications _ algorithm ))

Refine Results
  1. 1

    Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm by Dalatu, Paul Inuwa

    Published 2018
    “…We introduced two new approaches to normalization techniques to enhance the K-Means algorithms. This is to remedy the problem of using the existing Min-Max (MM) and Decimal Scaling (DS) techniques, which have overflow weakness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…To build an efficient classifier model, researchers have introduced hybrid models that combine both fuzzy logic and artificial neural networks. Among these algorithms, Fuzzy Min Max (FMM) neural network algorithm has been proven to be one of the premier neural networks for undertaking the pattern classification problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…Therefore the project want to try to rectify this issue by trying to develop an Intelligent Congkak System that also implemented NN and try answer research question such as this: “What is the best Congkak evaluation function for training NN for game playing?” and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm by Azmin, Farah Ayuni

    Published 2017
    “…Genetic algorithm is a method which is easily transferred to the existing simulations and models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Maximum 2-satisfiability in radial basis function neural network by Shehab Abdulhabib Alzaeemi, Saratha Sathasivam, Mohd Shareduwan Mohd Kasihmuddin, Mohd. Asyraf Mansor

    Published 2020
    “…This paper presents a new paradigm in using MAX2SAT by implementing in Radial Basis Function Neural Network (RBFNN). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Improving neural networks training using experiment design approach by Chong, Wei Kean

    Published 2005
    “…This project involves the use of Neural Networks (NN) for function approximation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A quantum-inspired particle swarm optimization approach for environmental/economic power dispatch problem using cubic criterion function by Mahdi, F.P., Vasant, P., Abdullah-Al-Wadud, M., Watada, J., Kallimani, V.

    Published 2018
    “…Many-objective EED problems are defined by using a cubic criterion function, and a max/max price penalty factor is considered to convert all the objectives into a single objective to compare the final results with other well-known methods found in the literature like Lagrangian relaxation, particle swarm optimization, simulated annealing, and quantum-behaved bat algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    A quantum-inspired particle swarm optimization approach for environmental/economic power dispatch problem using cubic criterion function by Mahdi, F.P., Vasant, P., Abdullah-Al-Wadud, M., Watada, J., Kallimani, V.

    Published 2018
    “…Many-objective EED problems are defined by using a cubic criterion function, and a max/max price penalty factor is considered to convert all the objectives into a single objective to compare the final results with other well-known methods found in the literature like Lagrangian relaxation, particle swarm optimization, simulated annealing, and quantum-behaved bat algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    MiMaLo: advanced normalization method for mobile malware detection by Sriyanto, Sahib @ Sahibuddin, Shahrin, Abdollah, Mohd Faizal, Suryana, Nanna, Suhendra, Adang

    Published 2022
    “…The application of the MiMaLo method using the neural network algorithm produces an accuracy of 93.54% with AUC of 0.982.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
    Get full text
    Learning Object
  19. 19

    Design Optimization of a Gas Turbine Engine for Marine Applications: Off-Design Performance and Control System Considerations by Machmudah, A., Lemma, T.A., Solihin, M.I., Feriadi, Y., Rajabi, A., Afandi, M.I., Abbasi, A.

    Published 2022
    “…Meta-heuristic optimizations, namely a genetic algorithm (GA) and a whale optimization algorithm (WOA), are applied to optimize the designed control system. …”
    Get full text
    Get full text
    Article
  20. 20

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
    Get full text
    Get full text
    Thesis