Search Results - (( java application force algorithm ) OR ( framework implementation matching algorithm ))
Search alternatives:
- framework implementation »
- implementation matching »
- application force »
- java application »
- force algorithm »
-
1
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
2
Implementing case-based reasoning approach to framework documentation
Published 2023“…This paper discusses and implements the case-based reasoning (CBR) approach to documenting a framework. …”
Conference paper -
3
Disparity Refinement Process Based On Ransac Plane Fitting For Machine Vision Applications
Published 2017“…The experimental results show that the proposed framework produces better-quality and more accurate than normal flow state-of-the-art stereo matching algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…This algorithm can be implemented in both website and search engine.…”
Get full text
Get full text
Research Reports -
5
Implementation of perez-dumortier calibration algorithm
Published 2014“…The implementation of the filtration procedure in step-by-step is discussed to render better framework of the proposed calibration algorithm. …”
Get full text
Get full text
Get full text
Chapter In Book -
6
Development of a task-oriented, auction-based task allocation framework for a heterogeneous multirobot system
Published 2020“…The developed framework consists of a novel heuristic-based task allocation algorithm and communication module. …”
Get full text
Get full text
Get full text
Article -
7
Disparity map algorithm using hierarchical of bitwise pixel differences and segment-tree from stereo image
Published 2024“…This thesis presents a local-based stereo matching algorithm to increase the accuracy on complex regions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Embedded car plate image recognition system
Published 2008“…In order to speed up the image processing process, the system do not use complex algorithm such as Neural Network but use a simple algorithm such as template matching. …”
Get full text
Learning Object -
9
Job Matching Mobile Application using Fuzzy Analytic Hierarchy Process (FAHP) / Mohammad Ashraf Jefrizin
Published 2017“…Findings of this project is portrayed as conceptual framework that consists the structure of job matching mobile application using FAHP algorithm. …”
Get full text
Get full text
Student Project -
10
-
11
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
Get full text
Get full text
Thesis -
12
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Moreover, the concealment includes patches for both smooth and nonsmooth areas. This framework is implemented in three key steps. The first step is devoted to detecting invisible patches. …”
Get full text
Get full text
Thesis -
13
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
14
Slam-based mapping for object recognition
Published 2018“…The aim of this project is to map an unknown environment, autonomously navigate to the 2D navigation goal set by user and recognize object placed in object database by using a custom made differential-drive mobile robot that works under the Robot Operating System (ROS) framework. The concept of deploying the robot in search and rescue mission, is being implemented so that the efficiency of search and rescue mission can be improved at a lower cost. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Image Stitching Of Aerial Footage
Published 2021“…In this project, an image stitching framework is proposed to take aerial footage as input data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem
Published 2022“…The fundamental and standard algorithm were first introduced. Then, the work on the algorithm improvements was surveyed. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
text::Thesis -
18
Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
Published 2018“…The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
20
Collective interaction filtering with graph-based descriptors for crowd behaviour analysis
Published 2018“…The group detection experiment is implemented using the clustering algorithm. Normalized Mutual Information and Rand Index are used to measure the performance of Collective Interaction Filtering. …”
Get full text
Get full text
Thesis
