Search Results - (( basic complex ((data algorithm) OR (tree algorithm)) ) OR ( java application _ algorithm ))
Search alternatives:
- java application »
- data algorithm »
- tree algorithm »
- basic complex »
-
1
-
2
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
Get full text
Get full text
Conference or Workshop Item -
3
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
4
-
5
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
6
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…Subsequently, a re-scoring rank was generated by AnkPlex using a combination of a decision tree algorithm and logistic regression. AnkPlex achieved superior efficiency with ≥1 near-native complexes in the 10 top-rankings for nine X-ray complexes compared to ZDOCK, which only obtained six X-ray complexes. …”
Get full text
Get full text
Article -
7
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
Published 2018“…The calculation process of RV coefficient among all pairs of stocks can be shortened and eased as the proposed algorithm consists of time complexity of order of O(n2). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
-
12
-
13
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…Third, the range which is defined as left or right is used for gesture recognition. Lastly, the basic transformation such as rotation, translation and scale is executed if a data motion lies within the range. …”
Get full text
Get full text
Academic Exercise -
14
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. …”
Get full text
Get full text
Final Year Project -
15
Accelerating graph algorithms with priority queue processor
Published 2006“…Many graph algorithms are organized as simple elaborations of basic graph searching algorithms. …”
Get full text
Get full text
Article -
16
Recovery of tree community composition across different types of anthropogenic disturbances and characterization of their effect using Landsat time series in Bornean tropical monta...
Published 2022“…We also investigated the use of metrics from spectral trajectories of a Landsat time series (LTS) change detection algorithm (LandTrendr) to identify characteristics of disturbance events and their linkage to the recovery of tree community composition, with field validation. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A highly efficient algorithm for phased-array mmWave massive MIMO beamforming
Published 2021“…Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.…”
Get full text
Get full text
Article -
19
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
