Search Results - (( java application learning algorithm ) OR ( frames evaluation modified algorithm ))
Search alternatives:
- application learning »
- evaluation modified »
- learning algorithm »
- frames evaluation »
- java application »
-
1
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…Block-matching motion estimation is the most important part in today's video coding techniques and standard, such as 1S0/IEC MPEG-1, 2, 4, ITU-T H.261, H.263, and the emerging H.264. Each of the video frames is divided into macroblocks. The computational of the current pixel in current frame is compared to the previous decoded frame as a reference. …”
Get full text
Get full text
Thesis -
2
-
3
Modified synchronous reference frame based shunt active power filter with fuzzy logic control pulse width modulation inverter
Published 2017“…In order to mitigate this power quality issue, the shunt active power filter (SAPF) has been widely applied and it is proven to be the best solution to current harmonics. This paper evaluates the performance of the modified synchronous reference frame extraction (MSRF) algorithm with fuzzy logic controller (FLC) based current control pulse width modulation (PWM) inverter of three-phase three-wire SAPF to mitigate current harmonics. …”
Get full text
Get full text
Get full text
Article -
4
-
5
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
Published 2011“…The ACF-non-cryptographic countermeasure proposes a lightweight security model without involving cryptographic algorithms. The ACF-cryptographic countermeasure proposes four distinct models; two models are based on SHA1 and SHA2, and another two models are based on modified SHA1 and SHA2. …”
Get full text
Get full text
Thesis -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
9
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
10
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
11
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
12
-
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
14
Instance matching framework for heterogeneous semantic web content over linked data environment
Published 2021“…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
Get full text
Get full text
Thesis -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Video steganography based on DCT psychovisual and object motion
Published 2020“…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
18
Video steganography based on DCT psychovisual and object motion
Published 2020“…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Development of an integrated scheduling model for handling equipment in automated port container terminals
Published 2014“…In addition, results proved that the modified meta-heuristic algorithm is able to find near optimal solutions and on average, the solutions found by the GA algorithm are only 0.2% worse than the optimal solutions and in the worst case in the test cases this difference is 2.3% which is acceptable. …”
Get full text
Get full text
Thesis -
20
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
