Search Results - (( code evaluation modified algorithm ) OR ( java application during algorithm ))
Search alternatives:
- evaluation modified »
- application during »
- java application »
- during algorithm »
- code evaluation »
-
1
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…In this paper, we developed a high quality speech compression for Quranic recitation by modifying Code Excited Linear Prediction (CELP) algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
5
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…The fast search for ME techniques have their own shapes or patterns to work with in order to produce the best matching algorithm. The shape is actually representing the number of candidate need to be evaluated and fewer numbers of candidates will reduce the complexity of computational yet trying to keep a good block matching. …”
Get full text
Get full text
Thesis -
6
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…Therefore, the SCLAPF algorithm, which jointly evaluates the energy-efficient scheduling and partial feedback, gives the best tradeoff between uplink and downlink performances.…”
Get full text
Get full text
Thesis -
7
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…In this thesis, we also study and evaluate different conventional linear pre-coding schemes as well as how they relate to optimal structure of the solution which maximize the system performances. …”
Get full text
Get full text
Thesis -
8
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
Get full text
Get full text
Get full text
Article -
11
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
12
-
13
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Thus, there is a need to evaluate this kind of approach against relevant industrial software, with a purpose to show the degree of interaction required to cover the code as well as finding faults. …”
Get full text
Get full text
Get full text
Article -
14
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Three-dimensional coded aperture scintigraphy proposed for early tumor detection
Published 2024“…Background: Modified Uniformly Redundant Array (MURA) Coded Aperture (CA) is a type of mask recently proposed for breast tumor imaging. …”
Get full text
Get full text
Get full text
Article -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Homology modelling and structural analysis of Phytases
Published 2010“…This particular score uses the BLOSUM substitution matrix, which is a block substitution matrix that uses segments of blocks corresponding to the most highly conserved regions of proteins. Both models were evaluated and found to be quite satisfactory without being manually modified. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis -
19
-
20
