Search Results - (( using vectorization research algorithm ) OR ( java application model algorithm ))
Search alternatives:
- using vectorization »
- research algorithm »
- application model »
- java application »
- model algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
Get full text
Get full text
Get full text
Thesis -
6
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Web Algorithm search engine based network modelling of Malaria Transmission
Published 2013“…Unfortunately, such a practice leads to waste of resources on the wrong places, while ignoring the areas of critical vector existence. This research formalizes a contact network using a number of attributes of the malaria vectors, the public places, and the human beings that affect malaria transmission. …”
Get full text
Get full text
Get full text
Thesis -
8
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. …”
Get full text
Get full text
Get full text
Article -
9
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
Improved nu-support vector regression algorithm based on principal component analysis
Published 2023“…However, outliers have an adverse effect on the PCA, and hence reduce the accuracy of the prediction model. To date, no research has been done to incorporate the PCA into the algorithm of support vector regression (SVR) technique in order to obtain an accurate prediction model with high accuracy. …”
Get full text
Get full text
Article -
12
-
13
Document classification based on kNN algorithm by term vector space reduction
Published 2023Conference Paper -
14
-
15
-
16
Landslide risk zoning using support vector machine algorithm
Published 2024“…The weighted maps were then combined using the support vector machine algorithm. For the training and testing of the machine, 81 slippery ground points and 81 non-sliding points were used. …”
Article -
17
-
18
-
19
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
