Search Results - (( java application testing algorithm ) OR ( parameter detection matching algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…This paper reports the finding of segmentation experiment using four criterions ie. the insertion, omissions, accuracy and segmentation match between the algorithms. The result shows that divergence algorithm performed only slightly better and has opposite effect of the testing parameter p and L compared to Brandt’s GLR. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the final localization step, with the adjustment of the parameters, the result shows that this algorithm was able to correctly localize all input models from the scene point cloud, achieving a 100% localization accuracy.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Adaptive template matching of photoplethysmogram pulses to detect motion artefact by Lim, Pooi Khoon, Ng, Siew Cheok, Lovell, Nigel Hamilton, Yu, Yong Poh, Tan, Maw Pin, McCombie, Devin, Lim, Einly, Redmond, Stephen James

    Published 2018
    “…Integration of the proposed artefact detection technique into remote monitoring devices could enhance reliability of the PPG-derived physiological parameters.…”
    Get full text
    Get full text
    Article
  8. 8

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…Different matching/mismatching approaches have been adopted in the detection of malware which includes anomaly detection technique, misuse detection, or hybrid detection technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10

    Measuring height of high-voltage transmission poles using unmanned aerial vehicle (UAV) imagery by Qayyum, A., Malik, A.S., Saad, N.M., bin Abdullah, M.F., Iqbal, M., Rasheed, W., Bin Ab Abdullah, A.R., Hj Jaafar, M.Y.

    Published 2017
    “…Results were compared with well-known algorithms; including, for example, global and local stereo matching algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    A generalized mixed model framework for assessing fingerprint individuality in presence of varying image quality by Dass, S.C., Lim, C.Y., Maiti, T.

    Published 2014
    “…We develop algorithms based on the Laplace approximation of the likelihood and infer the unknown parameters based on this approximate likelihood. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    An automated approach for analysis of Fourier Transform Infrared (FTIR) spectra of edible oils by Siong-Fong, Sim, Woei, Ting

    Published 2012
    “…This paper reports a computational approach for analysis of FTIR spectra where peaks are detected, assigned and matched across samples to produce a peak table with rows corresponding to samples and columns to variables. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Safe experimentation dynamics algorithm for identification of cupping suction based on the nonlinear Hammerstein model by Kavindran, Suresh, Mohd Riduwan, Ghazali, Mohd Ashraf, Ahmad

    Published 2023
    “…This research paper suggests a method to detect the cupping suction model by employing the Hammerstein model and utilizing the Safe Experimentation Dynamics (SED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A robust traffic quantity measurement with video surveillance by Rad, A.G., Karim, M.R.

    Published 2011
    “…The method consists of three algorithms. First, background modeling and update, second, a boosting method to enhance the foreground image and reduce the noise and at last determining best match of region of interest (ROI) to extract information to conclude if there is a vehicle in the detection zone or not. …”
    Get full text
    Get full text
    Article