Search Results - (( using evaluation from algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- using evaluation »
- java application »
- during algorithm »
- evaluation from »
- from algorithm »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The proposed system is then designed and developed using Java programming language. The performance of the proposed system is evaluated in a two-floor building using offthe- shelf WLAN access points and client device. …”
Get full text
Get full text
Thesis -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Performance evaluation of marker recognition algorithm for mobile augmented reality in the real environment
Published 2023“…The robustness of the AR algorithm in terms of scale invariance was evaluated from the distance of 5cm up to 50cm from the input image. …”
Get full text
Get full text
Get full text
Article -
5
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…This study demonstrates the mechanism of evaluating an enhanced algorithm using performance metrics and validated it using statistical analysis. …”
Get full text
Get full text
Get full text
Article -
6
Objective evaluation of speech enhancement using compressive sensing algorithm
Published 2013“…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Comparative analysis of blockchain consensus algorithms from Shariah perspective / Tasneem Darwish … [et al.]
Published 2020“…In particular, the considered consensus algorithms are evaluated from a Shariah perspective. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced Image View Synthesis Using Multistage Hybrid Median Filter For Stereo Images
Published 2018“…Disparity depth map estimation of stereo matching algorithm is one of the most active research topics in computer vision.In the field of image processing,many existing stereo matching algorithms to obtain disparity depth map are developed and designed with low accuracy.To improve the accuracy of disparity depth map is quite challenging and difficult especially with uncontrolled dynamic environment.The accuracy is affected by many unwanted aspects including random noises,horizontal streaks,low texture,depth map non-edge preserving, occlusion,and depth discontinuities.Thus,this research proposed a new robust method of hybrid stereo matching algorithm with significant accuracy of computation.The thesis will present in detail the development,design, and analysis of performance on Multistage Hybrid Median Filter (MHMF).There are two main parts involved in our developed method which combined in two main stages.Stage 1 consists of the Sum of Absolute Differences (SAD) from Basic Block Matching (BBM) algorithm and the part of Scanline Optimization (SO) from Dynamic Programming (DP) algorithm.While,Stage 2 is the main core of our MHMF as a post-processing step which included segmentation,merging, and hybrid median filtering.The significant feature of the post-processing step is on its ability to handle efficiently the unwanted aspects obtained from the raw disparity depth map on the step of optimization.In order to remove and overcome the challenges unwanted aspects, the proposed MHMF has three stages of filtering process along with the developed approaches in Stage 2 of MHMF algorithm.There are two categories of evaluation performed on the obtained disparity depth map: subjective evaluation and objective evaluation.The objective evaluation involves the evaluation on Middlebury Stereo Vision system and evaluation using traditional methods such as Mean Square Errors (MSE),Peak to Signal Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM).Based on the results of the standard benchmarking datasets from Middlebury,the proposed algorithm is able to reduce errors of non-occluded and all errors respectively.While,the subjective evaluation is done for datasets captured from MV BLUE FOX camera using human's eyes perception.Based on the results,the proposed MHMF is able to obtain accurate results, specifically 69% and 71% of non-occluded and all errors for disparity depth map, and it outperformed some of the existing methods in the literature such as BBM and DP algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Improving Vector Evaluated Particle Swarm Optimisation by Incorporating Nondominated Solutions
Published 2013“…The Vector Evaluated Particle Swarm Optimisation algorithm is widely used to solve multiobjective optimisation problems. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022“…Three defects categories and one non-defect were chosen for this evaluation. The key metrics for the evaluation are classification accuracy, classification precision and classification recall. 855 images were used to train and test the algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin
Published 2010“…These nodes generally represent the free space extracted from the robot map. Performances between both algorithms were compared and evaluated in terms of speed and number of iterations that each algorithm takes to find an optimal path within several selected environments. …”
Get full text
Get full text
Get full text
Article -
13
Evaluation of feature selection algorithm for android malware detection
Published 2018“…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Article -
14
Development of lecturers' publication score algorithm / Zamali Tarmudi and Haijon Gunggut
Published 2016“…Based on predetermined characteristics, a comprehensive algorithm was designed with multiple factor bases using the fuzzy evaluation approach. …”
Get full text
Get full text
Article -
15
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
16
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…The aggregation algorithms were employed on the forecasts obtained from all individual NN models as well as on a number of the best forecasts obtained from the best NN models. …”
Get full text
Get full text
Thesis -
17
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023“…The proposed algorithms will be evaluated in terms of performance, scalability, and latency. …”
Get full text
Get full text
Undergraduates Project Papers -
18
New algorithm for evaluation of electric fields due to indirect lightning strike
Published 2010“…In addition, this proposed algorithm can also be used to evaluate the effect at the far distance cases of observation point from lightning channel.…”
Get full text
Get full text
Get full text
Article -
19
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…Therefore, the aim of the project is to analyse and evaluate various different algorithms used image encryption in WSN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An evaluation of feature selection technique for dendrite cell algorithm
Published 2014“…Eight universal datasets are chosen and assessing their performance according to sensitivity, specificity, and accuracy. From the experiment, the Rough Set Genetic Algorithm reduct is found to be the most effect feature selection for dendrite cell algorithm when it generates a consistent result for all evaluation metrics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
