Search Results - (( using codification using algorithm ) OR ( basic evaluation result algorithm ))
Search alternatives:
- using codification »
- codification using »
- evaluation result »
- basic evaluation »
- result algorithm »
- using algorithm »
-
1
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
3
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015“…The smoother the disparity depth map, the better results of triangulation can be achieved. This paper presents the evaluation of the existing stereo matching algorithms in the aspects of the speed of computational on depth map obtained. …”
Get full text
Get full text
Book Chapter -
4
Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation
Published 2014“…The smoother the disparity depth map, the better results of triangulation can be achieved. This paper presents the evaluation of the existing stereo matching algorithms in the aspects of the speed of computational on depth map obtained. …”
Get full text
Get full text
Get full text
Book Chapter -
5
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…In this paper, we analyzed and evaluated the randomness properties of basic components of SNOW 3G cipher. …”
Get full text
Get full text
Get full text
Article -
6
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
7
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability problems have been one of the major concerns for electric utilities as a result of a system heavy loading. This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
8
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
9
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…Finally, the proposed ASH was tested on two well known benchmark data sets to evaluate its performance and effectiveness. The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
10
Enhanced Image View Synthesis Using Multistage Hybrid Median Filter For Stereo Images
Published 2018“…Disparity depth map estimation of stereo matching algorithm is one of the most active research topics in computer vision.In the field of image processing,many existing stereo matching algorithms to obtain disparity depth map are developed and designed with low accuracy.To improve the accuracy of disparity depth map is quite challenging and difficult especially with uncontrolled dynamic environment.The accuracy is affected by many unwanted aspects including random noises,horizontal streaks,low texture,depth map non-edge preserving, occlusion,and depth discontinuities.Thus,this research proposed a new robust method of hybrid stereo matching algorithm with significant accuracy of computation.The thesis will present in detail the development,design, and analysis of performance on Multistage Hybrid Median Filter (MHMF).There are two main parts involved in our developed method which combined in two main stages.Stage 1 consists of the Sum of Absolute Differences (SAD) from Basic Block Matching (BBM) algorithm and the part of Scanline Optimization (SO) from Dynamic Programming (DP) algorithm.While,Stage 2 is the main core of our MHMF as a post-processing step which included segmentation,merging, and hybrid median filtering.The significant feature of the post-processing step is on its ability to handle efficiently the unwanted aspects obtained from the raw disparity depth map on the step of optimization.In order to remove and overcome the challenges unwanted aspects, the proposed MHMF has three stages of filtering process along with the developed approaches in Stage 2 of MHMF algorithm.There are two categories of evaluation performed on the obtained disparity depth map: subjective evaluation and objective evaluation.The objective evaluation involves the evaluation on Middlebury Stereo Vision system and evaluation using traditional methods such as Mean Square Errors (MSE),Peak to Signal Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM).Based on the results of the standard benchmarking datasets from Middlebury,the proposed algorithm is able to reduce errors of non-occluded and all errors respectively.While,the subjective evaluation is done for datasets captured from MV BLUE FOX camera using human's eyes perception.Based on the results,the proposed MHMF is able to obtain accurate results, specifically 69% and 71% of non-occluded and all errors for disparity depth map, and it outperformed some of the existing methods in the literature such as BBM and DP algorithms.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The recommendation for future work is to evaluate various type of data and different type of hashing algorithm.…”
Get full text
Get full text
Thesis -
12
Communication and computational cost on parallel algorithm of PDE elliptic type
Published 2009Get full text
Get full text
Book Section -
13
-
14
-
15
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Overall, the study shows that the UHDS8 algorithm produces better results compared to the FUHS16 and UHDS16 algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
16
T-way testing : a test case generator based on melody search algorithm
Published 2015“…After the generation of Final test List through the execution of TTT-MS, the results are being evaluated and compared with other existing t-way strategies. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Mobile robot navigation using GPS to solve target location achieving problem / Saiful Zaimy Yahaya, Rozan Boudville and Mohamad Faizal Abdul Rahman
Published 2010“…The data received from GPS is processed and hence the decision is made for the robot navigation path by the algorithm applied in the microcontroller. The path finding algorithm will basically finds the best path and instructs the robot to moves to its location by keep on refreshing its positions. …”
Get full text
Get full text
Research Reports -
18
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
19
An effect of simplifying magic rules for answering recursive queries in deductive databases
Published 1997“…The basic magic sets transformation algorithm for rewriting logical rules in deductive databases is very clear and straightforward. …”
Get full text
Get full text
Get full text
Article -
20
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article
