Search Results - (( basic evaluation study algorithm ) OR ( java implementation matching algorithm ))
Search alternatives:
- implementation matching »
- java implementation »
- basic evaluation »
- evaluation study »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…During location estimation, current histogram of RSS at unknown location will be compared to the database. The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
3
High performance hierarchical torus network under matrix transpose traffic patterns
Published 2004“…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Shortest Path Trajectory System Based on Dijkstra Algorithm
Published 2012“…This study discussed the emphasis on the single source shortest path at the location of specific studies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering
Published 2023“…That is, this study obtained consumers' aesthetic emotional preference for men's plain-colour shirts in China, colour design elements of shirts that are widely recognized and accepted, basic colour calculation scales, recommendation preferences algorithms and models for group consumers, and verified their effectiveness by PCA.…”
Get full text
Get full text
Get full text
Article -
6
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
Get full text
Get full text
Thesis -
7
Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak
Published 2022“…Therefore, this study aims to identify and evaluate the attributes and parameters associated with the development of the Basic Reproduction Number, R0 models, classify the data used in existing Basic Reproduction Number R0 models, develop a predictive classification model for the Basic Reproduction Number, R0 and to assess and enhance the accuracy of the Basic Reproduction Number, R0 prediction. …”
Get full text
Get full text
Monograph -
8
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
9
-
10
Dynamic communication performance of a hierarchical torus network under non-uniform traffic patterns
Published 2004“…In this paper, we present a deadlock-free routing algorithm for the HTN using 3 virtual channels and evaluate the network's dynamic communication performance under three non-uniform traffic patterns, using the proposed routing algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Convergence Analysis of the African Buffalo Optimization Algorithm
Published 2016“…The analysis of the convergence of Nature-inspired optimization algorithms is necessary to help researchers and practitioners understand the workings of the algorithms in the algorithms’ attempts at solutions. …”
Get full text
Get full text
Get full text
Article -
12
A study on the parameter selection of bat algorithm in in optimizing parameters in camera auto calibration problem
Published 2022“…The Bat Algorithm's performance is evaluated using a case study from a database from Le2i Universite de Bourgoune. …”
Get full text
Get full text
Get full text
Article -
13
-
14
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006Get full text
Get full text
Research Reports -
15
A study on personalized recommender system using social media
Published 2020“…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Overall, the study shows that the UHDS8 algorithm produces better results compared to the FUHS16 and UHDS16 algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
18
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
19
An effect of simplifying magic rules for answering recursive queries in deductive databases
Published 1997“…The basic magic sets transformation algorithm for rewriting logical rules in deductive databases is very clear and straightforward. …”
Get full text
Get full text
Get full text
Article -
20
A comparison study of classifier algorithms for mobile-phone’s accelerometer based activity recognition
Published 2012“…As a continuation of the research towards the search for a suitable and reliable algorithm for real-time activity recognition using mobile phone, an evaluation and comparison study of the performance of seven different categories of classifier algorithms in classifying user activities were conducted. …”
Get full text
Get full text
Get full text
Article
