Search Results - (( code evaluation modified algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- evaluation modified »
- stemming algorithm »
- java application »
- code evaluation »
-
1
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…In this paper, we developed a high quality speech compression for Quranic recitation by modifying Code Excited Linear Prediction (CELP) algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
5
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…The fast search for ME techniques have their own shapes or patterns to work with in order to produce the best matching algorithm. The shape is actually representing the number of candidate need to be evaluated and fewer numbers of candidates will reduce the complexity of computational yet trying to keep a good block matching. …”
Get full text
Get full text
Thesis -
6
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…Therefore, the SCLAPF algorithm, which jointly evaluates the energy-efficient scheduling and partial feedback, gives the best tradeoff between uplink and downlink performances.…”
Get full text
Get full text
Thesis -
7
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…In this thesis, we also study and evaluate different conventional linear pre-coding schemes as well as how they relate to optimal structure of the solution which maximize the system performances. …”
Get full text
Get full text
Thesis -
8
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
Get full text
Get full text
Get full text
Article -
11
-
12
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…Thus, there is a need to evaluate this kind of approach against relevant industrial software, with a purpose to show the degree of interaction required to cover the code as well as finding faults. …”
Get full text
Get full text
Get full text
Article -
13
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Three-dimensional coded aperture scintigraphy proposed for early tumor detection
Published 2024“…Background: Modified Uniformly Redundant Array (MURA) Coded Aperture (CA) is a type of mask recently proposed for breast tumor imaging. …”
Get full text
Get full text
Get full text
Article -
15
Homology modelling and structural analysis of Phytases
Published 2010“…This particular score uses the BLOSUM substitution matrix, which is a block substitution matrix that uses segments of blocks corresponding to the most highly conserved regions of proteins. Both models were evaluated and found to be quite satisfactory without being manually modified. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…In this study, new elements have been developed, modified constitutive law has been proposed, new computational algorithm has been utilised. …”
Get full text
Get full text
Thesis -
17
-
18
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
-
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis
