Search Results - (( using function ((method algorithm) OR (max algorithm)) ) OR ( java applications _ algorithm ))
Search alternatives:
- java applications »
- method algorithm »
- using function »
- max algorithm »
-
1
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…We introduced two new approaches to normalization techniques to enhance the K-Means algorithms. This is to remedy the problem of using the existing Min-Max (MM) and Decimal Scaling (DS) techniques, which have overflow weakness. …”
Get full text
Get full text
Get full text
Thesis -
2
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
3
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
Get full text
Get full text
Student Project -
4
Modern fuzzy min max neural networks for pattern classification
Published 2019“…To build an efficient classifier model, researchers have introduced hybrid models that combine both fuzzy logic and artificial neural networks. Among these algorithms, Fuzzy Min Max (FMM) neural network algorithm has been proven to be one of the premier neural networks for undertaking the pattern classification problems. …”
Get full text
Get full text
Thesis -
5
Designing and Developing an Intelligent Congkak
Published 2011“…Therefore the project want to try to rectify this issue by trying to develop an Intelligent Congkak System that also implemented NN and try answer research question such as this: “What is the best Congkak evaluation function for training NN for game playing?” and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis -
7
Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review
Published 2025“…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
Get full text
Get full text
Get full text
Get full text
Article -
8
A New Technique To Design Coating Structure For Energy Saving Glass Using The Genetic Algorithm
Published 2017“…Genetic algorithm is a method which is easily transferred to the existing simulations and models. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Maximum 2-satisfiability in radial basis function neural network
Published 2020“…This paper presents a new paradigm in using MAX2SAT by implementing in Radial Basis Function Neural Network (RBFNN). …”
Get full text
Get full text
Get full text
Article -
10
Improving neural networks training using experiment design approach
Published 2005“…This project involves the use of Neural Networks (NN) for function approximation. …”
Get full text
Get full text
Thesis -
11
A quantum-inspired particle swarm optimization approach for environmental/economic power dispatch problem using cubic criterion function
Published 2018“…Many-objective EED problems are defined by using a cubic criterion function, and a max/max price penalty factor is considered to convert all the objectives into a single objective to compare the final results with other well-known methods found in the literature like Lagrangian relaxation, particle swarm optimization, simulated annealing, and quantum-behaved bat algorithm. …”
Get full text
Get full text
Article -
12
A quantum-inspired particle swarm optimization approach for environmental/economic power dispatch problem using cubic criterion function
Published 2018“…Many-objective EED problems are defined by using a cubic criterion function, and a max/max price penalty factor is considered to convert all the objectives into a single objective to compare the final results with other well-known methods found in the literature like Lagrangian relaxation, particle swarm optimization, simulated annealing, and quantum-behaved bat algorithm. …”
Get full text
Get full text
Article -
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
14
MiMaLo: advanced normalization method for mobile malware detection
Published 2022“…The application of the MiMaLo method using the neural network algorithm produces an accuracy of 93.54% with AUC of 0.982.…”
Get full text
Get full text
Get full text
Article -
15
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…In this paper, an efficient bandwidth allocation algorithm for the uplink traffic in mobile WiMAX is proposed. …”
Get full text
Get full text
Get full text
Article -
16
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
17
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Obstacle avoidance robot using sonar sensor (OARuS)
Published 2008“…The obstacle-avoidance method is a means to avoid obstacles that exist within the correction area of groping locomotion by applying a suitable algorithm to the humanoid robot’s control system. …”
Get full text
Learning Object -
19
Design Optimization of a Gas Turbine Engine for Marine Applications: Off-Design Performance and Control System Considerations
Published 2022“…Meta-heuristic optimizations, namely a genetic algorithm (GA) and a whale optimization algorithm (WOA), are applied to optimize the designed control system. …”
Get full text
Get full text
Article -
20
Effective downlink resource management for wimax networks
Published 2018“…Our EDRM framework involves three functions: Class-Based Scheduling (CBS) algorithm, Dynamic Bandwidth Allocation (DBA) scheme and Link Session Management (LSM) policy. …”
Get full text
Get full text
Thesis
