Search Results - (( using function method algorithm ) OR ( from implementation based algorithm ))

Refine Results
  1. 1

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
    Get full text
    Get full text
    Article
  2. 2

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Based on the results, the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…One of the categories of cryptography is a hash function. In this research, the field-programmable gate array (FPGA) device from Altera is used because of its higher performance and smaller area implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…With block method application on the based algorithm, a complex look up table is undesired. …”
    Get full text
    Get full text
    Thesis
  12. 12

    SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION by Chiu, Po Chan, Ali, Selamat, Kuok, King Kuok

    Published 2024
    “…The Sine Cosine Algorithm (SCA) is a relatively recent metaheuristic algorithm, drawing inspiration from the characteristics of trigonometric sine and cosine functions. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Global gbest guided-artificial bee colony algorithm for numerical function optimization by Shah, Habib, Tairan, Nasser, Garg, Harish, Ghazali, Rozaida

    Published 2018
    “…Numerous computational algorithms are used to obtain a high performance in solving mathematics, engineering and statistical complexities. …”
    Get full text
    Get full text
    Article
  14. 14

    Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller by Ismail, H. Muh Yusuf

    Published 2010
    “…This study investigates the use of Genetic Algorithms (GA) to design and implement of Fuzzy Logic Controllers (FLC). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Tests have shown that the differences are demonstrated only in execution time to arrive the best fitness function of the Genetic Algorithm. Whereas the results obtained from both selection methods are similar to each other. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…Although, fuzzy clustering algorithms such as fuzzy c-means provides an inherent mechanism for the clustering of overlapping structures (objects) but this potential of the fuzzy methods which comes from its fuzzy membership functions have not been utilized effectively. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…In particular, the search capacity of the MVO algorithm has been improved using the sine and cosine functions of the Sine Cosine Algorithm (SCA) that will be able to balance the processes of exploration and exploitation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…One of the cryptography categories is a hash function. This paper proposes the implementation of the SHA-256 (Secure Hash Algorithm-256) hash function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…Global method performs a matching process using global energy or a probability function over the whole image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Bayesian inference for the bivariate extreme model by Mohd Amin, Nor Azrita, Adam, Mohd Bakri

    Published 2016
    “…Using simulation study, the capability of MTM algorithm to analyze the posterior distribution is implement. …”
    Get full text
    Get full text
    Conference or Workshop Item