Search Results - (( developing validation matching algorithm ) OR ( java location based algorithm ))
Search alternatives:
- developing validation »
- validation matching »
- java »
-
1
Disparity map algorithm for stereo matching process using local based method
Published 2022“…The proposed SVDM algorithm involves four stages which starts from matching cost computation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Therefore, a new technique and algorithm were developed to resolve the image scale uncertainty. …”
Get full text
Get full text
Thesis -
4
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
6
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…This thesis therefore proposes a framework to address these issues through a two-step approach involving region matching and region labeling. Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…The Filtering framework provides foundation in developing the algorithm for searching tools. This algorithm can be implemented in both website and search engine.…”
Get full text
Get full text
Research Reports -
9
Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator
Published 2011“…The data for model training and validation are generated using semi-empirical models developed by the authors. …”
Get full text
Conference or Workshop Item -
10
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…Actives such as observation, interview and questionnaire has been done to gather the requirements for developing the system. CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
11
Sizing algorithm for stand-alone AC coupled Hybrid PV-diesel power system under Malaysian climate / Nor Syafiqah Syahirah Mohamed
Published 2016“…The performance indices are used part of the proposed algorithm as a predictive analytical tool for algorithm development. …”
Get full text
Get full text
Thesis -
12
-
13
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Algorithm for the legal regulation of internet financial crime
Published 2024“…Similarly, association rules showed a strong correlation between the test and experimental samples, further validating the predictive capabilities of the algorithms. …”
Get full text
Get full text
Get full text
Article -
15
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
A fuzzy-rule-based PV inverter controller to enhance the quality of solar power supply: Experimental test and validation
Published 2023“…The obtained simulation result of the developed fuzzy-based PV inverter controller is validated with experimental results under different performance conditions. …”
Article -
17
Prediction of football club winning rate using Bayesian model algorithm / Adam Khairul Anuar
Published 2023“…Recommendations include continuous model training, detailed features, collaboration with experts, and exploring alternative algorithms. In essence, this research contributes to football analytics, offering a reliable Bayesian model for match outcome prediction.…”
Get full text
Get full text
Thesis -
18
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…It proves that the contextual aware ranking of each traffic are correctly matched to one another. In order to verify the advantages of the proposed algorithm, it is compared with simulation results without contextual aware algorithm. …”
text::Thesis -
19
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Several experiments are performed to validate the effectiveness and robustness of the proposed algorithm against different attacks, such as pre-processing attacks. …”
Get full text
Get full text
Thesis -
20
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…The proposed automation software was tested by using March SR as the input algorithm and the results obtained from the simulations show that the output test patterns generated by the implemented memory BIST match the expected patterns and passed all the tests, which validated the correct functionality of the UDA description file generation. …”
Get full text
Get full text
Get full text
Article
