Search Results - (( java application bee algorithm ) OR ( framework implementation matching algorithm ))

Refine Results
  1. 1

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  2. 2

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…This paper discusses and implements the case-based reasoning (CBR) approach to documenting a framework. …”
    Conference paper
  3. 3

    Disparity Refinement Process Based On Ransac Plane Fitting For Machine Vision Applications by Hamzah, Rostam Affendi, Kadmin, Ahmad Fauzan, Abd Gani, Shamsul Fakhar, Hamid, Mohd Saad, Salam, Saifullah

    Published 2017
    “…The experimental results show that the proposed framework produces better-quality and more accurate than normal flow state-of-the-art stereo matching algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…This algorithm can be implemented in both website and search engine.…”
    Get full text
    Get full text
    Research Reports
  5. 5

    Implementation of perez-dumortier calibration algorithm by Jedol Dayou, Chang, Jackson Hian Wui, Justin Sentian

    Published 2014
    “…The implementation of the filtration procedure in step-by-step is discussed to render better framework of the proposed calibration algorithm. …”
    Get full text
    Get full text
    Get full text
    Chapter In Book
  6. 6

    Development of a task-oriented, auction-based task allocation framework for a heterogeneous multirobot system by Tan, Eijyne, Rishwaraj, G., Ponnambalam, S. G.

    Published 2020
    “…The developed framework consists of a novel heuristic-based task allocation algorithm and communication module. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image by Zainal Azali, Muhammad Nazmi

    Published 2024
    “…This thesis presents a local-based stereo matching algorithm to increase the accuracy on complex regions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded car plate image recognition system by Moo Wui Hung

    Published 2008
    “…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
    Get full text
    Learning Object
  9. 9

    Job Matching Mobile Application using Fuzzy Analytic Hierarchy Process (FAHP) / Mohammad Ashraf Jefrizin by Jefrizin, Mohammad Ashraf

    Published 2017
    “…Findings of this project is portrayed as conceptual framework that consists the structure of job matching mobile application using FAHP algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Error concealment technique using wavelet neural network for wireless transmitted digital images by Al-Azzawi, Alaa Khamees

    Published 2012
    “…Moreover, the concealment includes patches for both smooth and nonsmooth areas. This framework is implemented in three key steps. The first step is devoted to detecting invisible patches. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Slam-based mapping for object recognition by Loh, Wan Ying

    Published 2018
    “…The aim of this project is to map an unknown environment, autonomously navigate to the 2D navigation goal set by user and recognize object placed in object database by using a custom made differential-drive mobile robot that works under the Robot Operating System (ROS) framework. The concept of deploying the robot in search and rescue mission, is being implemented so that the efficiency of search and rescue mission can be improved at a lower cost. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…In this project, an image stitching framework is proposed to take aerial footage as input data. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…The fundamental and standard algorithm were first introduced. Then, the work on the algorithm improvements was surveyed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  17. 17

    Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots by Ahmad, Nazrul Muhaimin

    Published 2018
    “…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Collective interaction filtering with graph-based descriptors for crowd behaviour analysis by Wong, Pei Voon

    Published 2018
    “…The group detection experiment is implemented using the clustering algorithm. Normalized Mutual Information and Rand Index are used to measure the performance of Collective Interaction Filtering. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Online teleoperation of writing manipulator through graphics processing unit based accelerated stereo vision by Abu Raid, Fadi Imad Osman

    Published 2021
    “…Furthermore, the algorithms avoid computationally intensive correspondence problem by matching only the points of interest of a labeled pen to compute its position and orientation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain by Mohammad Asif , Hossain

    Published 2022
    “…The selection would be made based on the hybrid machine learning (ML) algorithm. A fuzzy-based Naive Bayes algorithm has been used in this case. …”
    Get full text
    Get full text
    Get full text
    Thesis