Search Results - (( _ evaluation case algorithm ) OR ( between transformational issues algorithm ))
Search alternatives:
- transformational issues »
- issues algorithm »
- evaluation case »
- case algorithm »
-
1
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
2
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…The study was evaluated using the developed model and benchmarked with existing data transformation techniques in the literature. …”
Get full text
Get full text
Get full text
Thesis -
3
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
4
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
5
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…The circular parameters between the pupil and the iris are found using current iris identification techniques but the accuracy creates an issue for the detection process during image processing. …”
Get full text
Get full text
Article -
6
Case Slicing Technique for Feature Selection
Published 2004“…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
Get full text
Get full text
Thesis -
7
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Results indicates that ACO outperforms GA in minimizing travel distance, establishing it as the superior routing algorithm for both case studies. Case study 1, the ACO algorithm achieved a best distance of 1036 (u) with execution time 1.67 (s), while the GA algorithm resulted in a best distance 1062 (u) with execution time 0.08 (s). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
An improved algorithm in test case generation from UML activity diagram using activity path
Published 2011“…This paper proposed an improved algorithm to automatically generate test cases directly from UML activity diagram using an activity graph.This algorithm has been implemented as a prototype using UML activity diagrams as inputs to generate test cases.These generated test cases are generated automatically are compared to test cases that are generated manually in order to evaluate the algorithm’s usability and reliability.The result shows that the test cases generated by the developed test case generator program are the same as the one manually derived.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…For instance, in case of forex, the online algorithm is presented daily exchange rates. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Thesis -
11
-
12
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
Get full text
Get full text
Final Year Project -
13
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Waste management using machine learning and deep learning algorithms
Published 2020“…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Sentiment analysis regarding childcare issues using Naive Bayes Algorithm / Alis Farhana Zulkipeli
Published 2025“…This study applies the Naive Bayes algorithm for sentiment analysis to assess public perceptions of childcare issues, particularly child abandonment and accidents. …”
Get full text
Get full text
Thesis -
16
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Thesis -
17
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…In the past, MOD was mainly tackled using image registration, which discovers correspondences between consecutive frames using pair-wise grayscale spatial visual appearance matching under rigid and affine transformations. …”
Get full text
Get full text
Get full text
Thesis -
18
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006Get full text
Get full text
Conference or Workshop Item -
19
New algorithm for evaluation of electric fields due to indirect lightning strike
Published 2010“…In addition, this proposed algorithm can also be used to evaluate the effect at the far distance cases of observation point from lightning channel.…”
Get full text
Get full text
Get full text
Article -
20
