Search Results - see ((new algorithm) OR (based algorithm))
Search alternatives:
-
1
Steganography algorithm to hide secret message inside an image
Published 2011“…Hence this new steganography algorithm is very efficient to hide the data inside the image.…”
Get full text
Get full text
Article -
2
An automated strabismus classification using machine learning algorithm for binocular vision management system
Published 2023“…This shows that using the case-based reasoning algorithm can give better performance in classifying the class.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
An automated strabismus classification using machine learning algorithm for binocular vision management system
Published 2023“…This shows that using the case-based reasoning algorithm can give better performance in classifying the class.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Photovoltaic System with INC MPPT Algorithm in MATLAB Simulink
Published 2013“…Simulation results show that the MPPT with INC algorithm offers the best performance in terms of its fastest response in tracking new MPP and highest efficiency under rapid change of irradiance level.…”
-
5
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
Get full text
Get full text
Get full text
Thesis -
6
A performance improvement of Domosi’s cryptosystem
Published 2015“…Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
A performance improvement of Dömösi’s cryptosystem
Published 2016“…Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
Get full text
Get full text
Thesis -
9
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…This research employed a new generational GA based on a combination of the proposed Rayleigh Crossover (RX) and proposed Scale Truncated Pareto Mutation (STPM) called RX-STPM. …”
Get full text
Get full text
Thesis -
13
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The results for the selection were evaluated respectively to see the variation in selection pattern when compared to the default selection algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Cloud computing is a choice of raising the capacity or adding extra capabilities with no new infrastructure investment to train new personnel, or get licence for new software. …”
Get full text
Get full text
Thesis -
15
Modeling and design control strategy for unwind/rewind system
Published 2008“…This project was replaced the PLC to computer controlled method. A new control algorithm that based on the regulator feedback was proposed. …”
Get full text
Get full text
Thesis -
16
Securing graphical user password using multi-grid technique from shoulder surfing attack / Leila Ghasemi Sabet
Published 2010“…Based on previous researches in the graphical password techniques especially recall-based techniques we had some problems from security point of view. …”
Get full text
Get full text
Thesis -
17
Shape-Based Matching: Application of Edge Detection using Harris Point
Published 2011“…This paper presents a sequence of object recognition algorithm using shape-based matching that mainly focused on image recognition, image segmentation, and flexible Region of Interest. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Performance and security improvements of Dӧmӧsi’s cryptosystem
Published 2016“…Dӧmӧsi’s cryptosystem (Dӧmӧsi’s, 2008; Dӧmӧsi, November 11–14, 2009) is a new stream cipher based on finite automata without outputs. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
A new minimum pheromone threshold strategy (MPTS) for max-min ant system
Published 2009Get full text
Get full text
Article -
20
Early detection of spots high water saturation for landslide prediction using thermal imaging analysis
“…The performance of these segmentation algorithms are measured using misclassification error. …”
Get full text
Get full text
Research Report
