Search Results - (( parameter detection path algorithm ) OR ( java evaluation model algorithm ))
Search alternatives:
- parameter detection »
- java evaluation »
- model algorithm »
- detection path »
- path algorithm »
-
1
Autonomous road roundabout detection and navigation system for smart vehicles and cities using laser simulator–fuzzy logic algorithms and sensor fusion
Published 2020“…The path generation algorithm was fully derived within the local maps and tested with a WMR platform in real-time.…”
Get full text
Get full text
Get full text
Article -
2
Path Planning and Control of Mobile Robot in Road Environments using Sensor Fusion and Active Force Control
Published 2018“…The sensor fusion algorithm is used to remove noises and uncertainties from sensors' data and provide optimum measurements for path planning. …”
Get full text
Get full text
Get full text
Article -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
4
Surface defect detection and polishing parameter optimization using image processing for G3141 cold rolled steel
Published 2016“…To realize this, automatic cropping algorithm is developed to detect the region of interest and interpret the Ga value. …”
Get full text
Get full text
Thesis -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
6
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
Get full text
Get full text
Article -
7
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques
Published 2017“…In this thesis, a hybrid detection algorithm mechanism has been proposed which combines two detection algorithms based on nodes’ trustworthiness and energy consumption in a parallel manner in order to detect the black hole nodes. …”
Get full text
Get full text
Get full text
Thesis -
9
A novel bio-inspired routing algorithm based on ACO for WSNs
Published 2019“…The issue of path selection to reach the nodes and vital correspondence parameters, for example, the versatility of nodes, their constrained vitality, the node residual energy and route length are considered since the communications parameters and imperatives must be taken into account by the imperative systems that mediate in the correspondence procedure, and the focal points of the subterranean insect framework have been utilized furthermore. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
Get full text
Get full text
Thesis -
11
Mobile robot safe navigation in unknown environment
Published 2012“…The information about the target and the low-range sensory information are used by the controller to produce the commands that gives a favorable direction in terms of reaching to the target within the collision detection. Furthermore, the mobile robot does not suffer from typical ushape environment by a planned local minimum trapping algorithm and also designed controller is easy to understand, simple, and not sensitive to the system model parameters. …”
Get full text
Conference or Workshop Item -
12
Effect of LiDAR mounting parameters and speed on HDL graph SLAM-Based 3D mapping for autonomous vehicles
Published 2025“…Results showed that a 0° angle at 30 km/h produced the most accurate 3D map, achieving a Root Mean Square Error (RMSE) of 0.0812 for straight paths and 0.1345 for curved paths. These findings demonstrate the significance of physical mounting parameters and speed on mapping performance. …”
Get full text
Get full text
Get full text
Article -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
15
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. In this paper, the stacking ensemble method is used to increase the accuracy of the machine learning model for LSM where the base (first-level) learners use five ML algorithms namely decision tree (DT), k-nearest neighbor (KNN), AdaBoost, extreme gradient boosting (XGB) and random forest (RF). …”
Conference Paper -
16
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. …”
Get full text
Get full text
Get full text
Article -
19
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
