Search Results - (( code adaptation optimisation algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- adaptation optimisation »
- optimisation algorithm »
- application mining »
- java application »
- mining algorithm »
- code adaptation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
-
4
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Potential of incorporating evolutionary based network coding for information scavenging in intelligent public transportation
Published 2013“…Genetic algorithm (GA) is introduced to further optimise the resources for network coding by searching optimum transmission route. …”
Get full text
Get full text
Research Report -
8
Multiple error correction (MEC) for lifetime optimisation in wireless sensor network / Samirah Nasuha Mohd Razali
Published 2019“…This research aimed to propose an algorithm of multiple error correction that is adapted to the changes of SNR and congestion in the network to reduce higher usage of energy consumption when higher error correcting capabilities were not necessary.…”
Get full text
Get full text
Thesis -
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
A self‐configured link adaptation for green LTE downlink transmission
Published 2015“…Then, a self‐configured link adaptation (SCLA) algorithm is developed to ensure that the priority weights related to EE and SE are adapted according to network load with the use of real‐time cross‐layer optimization. …”
Get full text
Get full text
Article -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
15
Implementation of luo-rudi phase 1 cardiac cell excitation model in FPGA
Published 2017“…For the rapid prototyping, a nonlinear Ordinary Differential Equation (ODE)based algorithm of the LR-I model is implemented by using Hardware Description Language (I-IDL) Coder that is capable to convert MATLAB Simulink blocks designed into a synthesisable VHSIC Hardware Description Language (VHDL) code and verified using the FPGA-In-the Loop (FIL) Co-simulator. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT
Published 2025“…Navigation paths are optimised using the A* algorithm, while ARCore integrates sensor data from the device’s gyroscope and accelerometer to enhance tracking accuracy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
Crypt Edge Detection Using PSO,Label Matrix And BI-Cubic Interpolation For Better Iris Recognition(PSOLB)
Published 2017“…Recently,there has been renewed interest in iris features detection.Gabor filter,cross entrophy, upport vector,and canny edge detection are methods which produce iris codes in binary codes representation.However,problems have occurred in iris recognition since low quality iris images are created due to blurriness,indoor or outdoor settings, and camera specifications.Failure was detected in 21% of the intra-class comparisons cases which were taken between intervals of three and six months intervals.However,the mismatch or False Rejection Rate (FRR) in iris recognition is still alarmingly high.Higher FRR also causes the value of Equal Error Rate (EER) to be high.The main reason for high values of FRR and EER is that there are changes in the iris due to the amount of light entering into the iris that changes the size of the unique features in the iris.One of the solutions to this problem is by finding any technique or algorithm to automatically detect the unique features.Therefore a new model is introduced which is called Crypt Edge Detection which combines PSO,Label Matrix,and Bi-Cubic Interpolation for Iris Recognition (PSOLB) to solve the problem of detection in iris features.In this research, the unique feature known as crypts has been chosen due to its accessibility and sustainability.Feature detection is performed using particle swarm optimisation (PSO) as an algorithm to select the best iris texture among the unique iris features by finding the pixel values according to the range of selected features.Meanwhile, label matrix will detect the edge of the crypt and the bi-cubic interpolation technique creates sharp and refined crypt images.In order to evaluate the proposed approach,FAR and FRR are measured using Chinese Academy of Sciences' Institute of Automation (CASIA) database for high quality images.For CASIA version 3 image databases, the crypt feature shows that the result of FRR is 21.83% and FAR is 78.17%.The finding from the experiment indicates that by using the PSOLB,the intersection between FAR and FRR produces the Equal Error Rate (EER) with 0.28%,which indicated that equal error rate is lower than previous value, which is 0.38%.Thus,there are advantages from using PSOLB as it has the ability to adapt with unique iris features and use information in iris template features to determine the user.The outcome of this new approach is to reduce the EER rates since lower EER rates can produce accurate detection of unique features.In conclusion,the contribution of PSOLB brings an innovation to the extraction process in the biometric technology and is beneficial to the communities.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…Furthermore, a novel hardware implementation of 3-D medical image compression system with context-based adaptive variable length coding (CAVLC) has been proposed. …”
Get full text
Get full text
Thesis
