Search Results - (( affecting implementing information algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implementing information »
- affecting implementing »
- information algorithm »
- implication based »
- java implication »
-
1
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
2
-
3
GIS mapping and shortest-path algorithm for drone-aided flood rescue operations
Published 2019“…This research aims to implement Geographic Information System (GIS) mapping to identify the major parts of an affected state that are more susceptible to floods and the construction of an optimal shortest path algorithm to conduct the rescue operation.…”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Analysis of genetic data in for implementation of compression algorithm in Alzheimer's disease database
Published 2011“…In this paper, we present the initial analysis of the data to identify candidates for compression, as well as implement the proposed compression algorithm to those data.…”
Get full text
Get full text
Research Reports -
5
Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid
Published 2012“…In computational grid, job scheduling is one of the main factors affecting grid computing performance. Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
Get full text
Get full text
Monograph -
6
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
7
Contrast enhancement for colour images based on discrete wavelet transform
Published 2017“…Therefore, the performance evaluation received can prove that the improvement result of the algorithm implemented by MATLAB can be accomplished.…”
Get full text
Get full text
Student Project -
8
-
9
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…However, the original floor plan is visualised into 2D layout to gather the information on nodes and weights. The information then is used to generate a directed graph in order to obtain the shortest path results through the implementation of shortest path algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
11
DEVELOPMENT OF NODE RELIABILITY DETECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS
Published 2014“…The proposed algorithm is then implemented on hardware compounding of several IRIS sensor motes. …”
Get full text
Get full text
Final Year Project -
12
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…The research methodology encompasses preliminary study, design and implementation, and evaluation phases. Literature review, knowledge acquisition, and dataset collection inform algorithm selection and dataset validation. …”
Get full text
Get full text
Thesis -
13
-
14
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
Get full text
Get full text
Get full text
Article -
15
Development of lung cancer prediction system using meta-heuristic optimized deep learning model
Published 2023“…The algorithm detects the affected region depending on pixel similarity computation process. …”
Get full text
Get full text
Get full text
Thesis -
16
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…A proof of concept mobile AR system is implemented as part of this thesis. Experiments and many evaluations are conducted to validate the proposed algorithms on iPhone. …”
Get full text
Get full text
Thesis -
17
Effects of strategic leadership, organizational innovativeness, information technology capability on effective strategy implementation
Published 2017“…Primarily, the study explored the effects of Strategic Leadership (SL), Organizational Innovativeness (OI) and Information Technology Capability (ITC) on Effective Strategy Implementation (ESI). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Prototype development for embedding large amount of information using secure LSB and neural based steganography
Published 2009“…The challenge to Steganography is the amount of information to be embedded in the host file without affecting the properties of that file and to avoid distortion of the image, the video, or the sound host file and as a result, to avoid detection of hidden information existence. …”
Get full text
Get full text
Thesis -
20
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
