Search Results - (( developing unique detection algorithm ) OR ( java evaluation model algorithm ))
Search alternatives:
- developing unique »
- unique detection »
- java evaluation »
- model algorithm »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
2
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020Get full text
Get full text
Monograph -
3
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
4
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
Get full text
Get full text
Article -
5
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
7
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
Get full text
Get full text
Get full text
Article -
8
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…The inclusion of the fall risk level identification, further enhanced and improved the accuracy of the fall detection. The experimental results showed promising performance in adapting the algorithm for people with different fall risk levels for fall detection.…”
Get full text
Get full text
Get full text
Article -
9
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
10
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
Published 2011“…Ability of the algorithm to localize modification undergone makes it a unique and efficient algorithm for authentication and tamper detection as well as blind detection applications.…”
Get full text
Get full text
Get full text
Article -
12
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
13
Micro-Crack Detection Of Solar Cells Featuring Adaptive Anisotropic Diffusion Filter And Semi-Supervised Support Vector Learning
Published 2014“…These properties together with the shape feature of the micro-crack are used in developing the detection algorithm. In this work, an image processing algorithm featuring an adaptive anisotropic diffusion filter and a segmentation technique based on twostage thresholding is proposed. …”
Get full text
Get full text
Thesis -
14
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
15
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
Get full text
Get full text
Thesis -
17
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Published 2019“…In this paper, an algorithm is developed in 3D Stereo vision to improve image stabilization process for multi-camera viewpoints. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR
Published 2013“…Data for the centroid of human is shown through the Graphical User Interface (GUI). One of the unique advantages in this project, the detection of human by color only uses image processing that generated by the algorithms itself without additional sensor like sonar or IF sensor.…”
Get full text
Get full text
Article -
19
Enhanced and effective parallel optical flow method for vehicle detection and tracking
Published 2016“…With a view to do improvements, it is proposed to develop an unique algorithm for vehicle data recognition and tracking using Parallel Optical Flow method based on Lucas-Kanade algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
20
Unveiling sarcastic intent: web-based detection of sarcasm in news / Mohd Nazzim Lahaji, Tajul Rosli Razak and Mohammad Hafiz Ismail
Published 2023“…The results demonstrate the superiority of the developed model in sarcasm detection for news headlines. …”
Get full text
Get full text
Get full text
Article
