Search Results - (( rate evaluation method algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4
  5. 5

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Improved Switching-Basedmedian Filter For Impulse Noise Removal by Teoh, Sin Hoong

    Published 2013
    “…Based on the evaluations from root mean square error (RMSE), false positive detection rate, false negative detection rate, mean structure similarity index (MSSIM), processing time, and visual inspection, it is shown that the proposed method is the best method when compared with seven other state-of-the art median filtering methods.…”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Optimising neural network training efficiency through spectral parameter-based multiple adaptive learning rates by Yeong, Lin Koay, Hong, Seng Sim, Yong, Kheng Goh, Sing, Yee Chua, Wah, June Leong

    Published 2024
    “…Selected datasets are used to evaluate the performance of the proposed method. The proposed algorithm is used to train the neural networks with di"erent hidden layer sizes and di"erent neurons. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Objective evaluation of speech enhancement using compressive sensing algorithm by Sulong, Amart, Gunawan, Teddy Surya, Khalifa, Othman Omran, Chebil, Jalel

    Published 2013
    “…Perceptual evaluation of speech quality (PESQ) is an objective evaluation of speech enhancement algorithm used to measure the enhanced speech quality. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Satellite attitude determination utilizing measurement sensor data and kalman filtering by Samaan, Malak A., Abdelrahman, Mohammad

    Published 2006
    “…This algorithm utilizes the three axis rate gyros for the satellite angular rate data and star camera line-of-sight measurements. …”
    Get full text
    Get full text
    Article
  13. 13

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    An enhanced opposition-based firefly algorithm for solving complex optimization problems by Ling, Ai Wong, Hussain Shareef, Azah Mohamed, Ahmad Asrul Ibrahim

    Published 2014
    “…This study introduces some methods to enhance the performance of original fi refl y algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis