Search Results - (( using factorization matching algorithm ) OR ( java equation using algorithm ))
Search alternatives:
- using factorization »
- using algorithm »
- equation using »
- matching »
- java »
-
1
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022“…The criteria used to find a match between workers and the work offered consist of two parts, core factors and secondary factors. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Stereo Matching Algorithm Based On Per Pixel Difference Adjustment, Iterative Guided Filter And Graph Segmentation
Published 2017“…Stereo matching process is a difficult and challenging task due to many uncontrollable factors that affect the results. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Disparity map algorithm for stereo matching process using local based method
Published 2022“…The proposed SVDM algorithm involves four stages which starts from matching cost computation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Car License Plate Recognition by Using Template Matching Algorithm
Published 2014“…CLPR is developed to recognise the car license plate with the implementation of Digital Image Processing (DIP) and Template Matching Algorithm (TMA) approach by using the MATLAB software. …”
Get full text
Get full text
Book -
5
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
6
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…The maximum allowable vehicle speed for the developed VO is up to 6.3 m/s.In short, the developed VO system, as well as the proposed algorithms and techniques, were successfully implemented, tested, and validated using real time kinematic GPS (RTK-GPS) with 2 cm positioning accuracy. …”
Get full text
Get full text
Thesis -
9
-
10
Face recognition door lock system / Danial Haziq Hakimi Salahuddin
Published 2023“…The camera captures the face of the person approaching the door, and the captured image is processed using facial recognition algorithms to match it against a preregistered database of authorized users. …”
Get full text
Get full text
Student Project -
11
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
12
Job Matching Mobile Application using Fuzzy Analytic Hierarchy Process (FAHP) / Mohammad Ashraf Jefrizin
Published 2017“…Findings of this project is portrayed as conceptual framework that consists the structure of job matching mobile application using FAHP algorithm. Evaluation is conducted using accuracy test where the result of this application is compared to the manual method using a survey. …”
Get full text
Get full text
Student Project -
13
Concept Based Lattice Mining (CBLM) using Formal Concept Analysis (FCA) for text mining
Published 2019“…Extracting relevant resources according to a query is imperative due to the factors of time and accuracy. This study proposes a model that enables query matching using output lattices from Formal Concept Analysis (FCA) tool, based on Graph Theory. …”
Get full text
Get full text
Conference or Workshop Item -
14
Assisted History Matching by Using Recursive Least Square and Discrete Cosine Transform
Published 2014“…Because of these factors, manual history matching technique consume a lot of time. …”
Get full text
Get full text
Final Year Project -
15
-
16
Concept Based Lattice Mining (CLBM) Using Formal Concept Analysis (FCA) for Text Mining
Published 2019“…Extracting relevant resources according to a query is imperative due to the factors of time and accuracy. This study proposes a model that enables query matching using output lattices from Formal Concept Analysis (FCA) tool, based on Graph Theory. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
18
Development of least square adjustment application for traversing / Harith Fadhillah Soeb
Published 2019“…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
Get full text
Get full text
Thesis -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis
