Search Results - (( _ evaluation drops algorithm ) OR ( between transformational based algorithm ))
Search alternatives:
-
1
Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field
Published 2018“…Blind Source Separation (BSS) refers to the statistical technique of separating a mixture of underlying source signals.BSS denotes as a phenomena and separation on mixed heart-lung sound is one of its example.The challenge of this research is to separate the separate lung sound and heart sound from mixed heart-lung sound.A clear lung sound for diagnosis purpose able to be obtained after separating the mixed heart-lung sound.In biomedical field,lung information is precious due to it has been provided for respiratory diagnosis.However,the interference of heart sound towards lung sound will generate ambiguity and it will lead to drop down the accuracy of diagnosis.Thus,a clean lung sound is needed to increases the accuracy of diagnosis.One of the ways for non-invasive respiratory diagnosis for obtaining lung information is through extracting lung sound from mixed heart-lung sound by using Two-Dimensional Nonnegative Matrix Factorization (NMF2D) algorithm.This method is based on cocktail party effect in which it refers to human brain able to selectively listen to target among a cacophony of conversations and background noise and this considered as a difficult task to machine.Therefore, duplication on cocktail party effect into machine is used to separate the mixed heart-lung sound.This research presents a novel approach NMF2D algorithm in which a suitable model for signal mixture that accommodated the reverberations and nonlinearity of the signals.The objectives of this research are focusing on investigating the useful signal analysis algorithms,defining a new technique of signal separability,designing and developing novel methods for BSS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Machine learning methods for herschel-bulkley fluids in annulus: Pressure drop predictions and algorithm performance evaluation
Published 2020“…This study emphasizes on the performance evaluation of given algorithms and their pitfalls in predicting accurate pressure drop. …”
Get full text
Get full text
Article -
3
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
Get full text
Get full text
Get full text
Article -
4
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
5
-
6
-
7
IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks
Published 2024“…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
Get full text
Get full text
Get full text
Article -
8
Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform
Published 2015“…Performance comparison between SURF and SIFT is made. To obtain matching point between images, Flann Based Matcher is used. …”
Get full text
Get full text
Thesis -
9
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
10
Markov-modulated Bernoulli-based performance analysis for BLUE algorithm under bursty and correlated traffics
Published 2024Subjects: “…BLUE algorithm…”
Conference Paper -
11
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…Memory-based architecture adopted for the all algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems
Published 2024“…This thesis presents an investigation of using the Intelligent Water Drops (IWD) algorithm to construct and produce good quality solutions for the UETP. …”
thesis::doctoral thesis -
13
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
Published 2016“…The paper introduces a new Haar-based transform algorithm (Haar-Paley-Recursive Transform, HPRT) in the form of a recursive function along with its fast transform version. …”
Get full text
Get full text
Get full text
Article -
14
Contrast enhancement for colour images based on discrete wavelet transform
Published 2017Get full text
Get full text
Student Project -
15
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
Published 2015“…Currently, there is no comparison documented done between Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
17
Correlation immunity and resiliency of boolean functions from haar domain perspective
Published 2015“…The results in this presentation are based on a simulation study of the Haar-based algorithm in comparison to its Walsh-counterpart. …”
Get full text
Get full text
Get full text
Article -
18
A Wavelet-Based Particle Swarm Optimization Algorithm for Digital Image Watermarking
Published 2012“…This paper proposes the application of Discrete Wavelet Transform (DWT) into image watermarking by using Particle Swarm Optimization (PSO) which is an evolutionary technique with the stochastic, population-based algorithm for solving this problem. …”
Get full text
Get full text
Get full text
Article -
19
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
20
Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model
Published 2023Conference Paper
