Search Results - (( wave application means algorithm ) OR ( based application ((new algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data by Daud, H., Mohd Aris, M.N., Mohd Noh, K.A., Dass, S.C.

    Published 2021
    “…Acquiring EM responses using mesh-based algorithms is a time-consuming task. Thus, this work compared the time taken by the CST and GP in evaluating the EM profiles. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Estimating Marine CSEM Responses Using Gaussian Process Regression Based on Synthetic Models by Mohd Aris, M.N., Daud, H., Mohd Noh, K.A., Dass, S.C.

    Published 2022
    “…Seabed logging (SBL) is an application of controlled-source electromagnetic (CSEM) waves to discover marine hydrocarbon-filled reservoirs based on the resistivity contrast of subsurface underneath the seabed. …”
    Get full text
    Get full text
    Article
  6. 6

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali by Hilyati Hanina, Zazali

    Published 2012
    “…The third algorithm describes the application of Decomposition Problem to the signing and verifying digital messages in ECC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Propose a New Machine Learning Algorithm based on Cancer Diagnosis by Ali, Mohammed Hasan, Kohbalan, Moorthy, Anad, Mohammed Morad, Mohammed, Mohammed Abdulameer

    Published 2018
    “…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A new fair marker algorithm for DiffServ networks by Elshaikh, M.A., Mohamed, Othman, Subramaniam, Shamala, Md. Desa, Jalil

    Published 2008
    “…Internet Engineering Task Force (IETF) has proposed many new technologies to cover the new real time applications which have become very important in today's Internet demands. …”
    Get full text
    Get full text
    Article
  20. 20