Search Results - (( probable evaluation method algorithm ) OR ( java application a algorithm ))
Search alternatives:
- probable evaluation »
- method algorithm »
- java application »
- application a »
- a algorithm »
-
1
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
2
Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer
Published 2016“…Variation in evaluation method will not give similar findings even same data is used. …”
Get full text
Get full text
Monograph -
3
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The generated probability map of the proposed tone mapped algorithm was then compared with the generated probability map of Ward tone mapping algorithm. …”
Get full text
Get full text
Thesis -
4
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Four treatment plans are created and DVHs are evaluated based on criteria of acceptance level. NTCP values for thorax plan one and two are evaluated by using different algorithm. …”
Get full text
Get full text
Monograph -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
7
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
-
10
Spam image filtering algorithm / Muhammad Hazim Shahimi
Published 2015“…This project applied Optical Character Recognition (OCR) and Bayesian probability to filter the spam images. The evaluation task is done by using formula of Precision, Recall, Error Rate, and Accuracy. …”
Get full text
Get full text
Thesis -
11
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
Get full text
Get full text
Monograph -
12
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The experiments in this study compare the SWMTop-kDelta algorithm with two previous researchers and two baseline approach algorithms to evaluate their effectiveness. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Thus, proposing the method of reestimating the dropping functions in the RED algorithm. …”
Get full text
Get full text
Thesis -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection
Published 2022“…Thus, a 5G-MIMO based CR communication system has been developed to enhance the spectrum by employing a spectrum sensing (SS) algorithm. This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
Get full text
Get full text
Article -
18
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
19
Design of A unmanned aerial vehicles assisted search and rescue collaboration architecture for emergency communication systems / Abdu Ahmed Saif Ahmed
Published 2022“…The multi-UAV and SAR collaboration have been evaluated based on average capacity, energy efficiency, line-of-sight probability, path loss, throughput performance, coverage probability analysis and outage probability performance. …”
Get full text
Get full text
Get full text
Thesis -
20
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
