Search Results - (( java application testing algorithm ) OR ( parameter extraction matching algorithm ))
Search alternatives:
- parameter extraction »
- application testing »
- testing algorithm »
- java application »
- matching »
-
1
A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications
Published 2021“…Feature extraction and matching algorithms are used in many computer vision problems, including object recognition and structure from motion. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…In order to circumvent a purely arbitrary choice of the internal parameters of the WKS algorithm, we present a four-step feature descriptor framework in an effort to further improve the classical wave kernel signature (WKS) by acting on its variance parameter. …”
Get full text
Get full text
Article -
5
Heuristic optimization-based wave kernel descriptor for deformable 3D shape matching and retrieval
Published 2018“…In order to circumvent a purely arbitrary choice of the internal parameters of the WKS algorithm, we present a four-step feature descriptor framework in an effort to further improve the classical wave kernel signature (WKS) by acting on its variance parameter. …”
Get full text
Get full text
Article -
6
Improved SIFT algorithm for place categorization
Published 2015“…Tradeoff between key points and processing time on feature extraction has been used. Selected parameters used in the experiment demonstrated that the computational cost of SIFT in feature extraction can be reduced to half. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity
Published 2018“…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
Get full text
Get full text
Proceeding -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
10
Adaptive template matching of photoplethysmogram pulses to detect motion artefact
Published 2018“…The developed algorithm was evaluated against a manually annotated 'gold standard' (GS). …”
Get full text
Get full text
Article -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Composing multi-relations association rules from crowdsourcing remuneration data
Published 2022“…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
Get full text
Get full text
Get full text
Article -
17
Model of Bayesian tangent eye shape for eye capture
Published 2014“…Owing to maximum a posteriori estimation, we can identify similarity transform coefficients as well as the eye shape parameters in BTESM. To apply the maximum a posteriori procedure, tangent Eye shape vector was considered the state of the model which is hidden and expectation maximization depending on searching algorithm was adopted. …”
Get full text
Get full text
Conference or Workshop Item -
18
A robust traffic quantity measurement with video surveillance
Published 2011“…The method consists of three algorithms. First, background modeling and update, second, a boosting method to enhance the foreground image and reduce the noise and at last determining best match of region of interest (ROI) to extract information to conclude if there is a vehicle in the detection zone or not. …”
Get full text
Get full text
Article -
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
