Search Results - (( developing block path algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- developing block »
- path algorithm »
- tree algorithm »
-
1
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow: article / Nurul Ain Husaini
Published 2010“…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
Get full text
Get full text
Article -
2
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow / Nurul Ain Husaini
Published 2010“…The first objective is to construct the trace back and reconstruction module of the S-W algorithm with the multiple blocks and the functionality for each block. …”
Get full text
Get full text
Student Project -
3
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…Using this method, the need for the knowledge of the degree of nonlinearity in advance can be avoided. The proposed algorithm models the Wiener-Hammerstein linear and nonlinear components in the secondary path and applies the estimated degree of nonlinearity of the nonlinear secondary path in the control algorithm design.In previous works, SEF-NLFXLMS and THF-NLFXLMS algorithms for Hammerstein and Wiener structures were developed where the acoustic path is assumed to be a unit gain. …”
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Routing problem in rectangular mesh network using shortest path based Greedy method
Published 2019“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
9
-
10
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…Genetic algorithm is also applied for the calibration of proposed model in terms of calibrated coefficients. …”
Get full text
Get full text
Thesis -
11
Arfict: Indoor navigation mobile application using augmented reality (AR) for FICT
Published 2025“…The system employs a marker-based localisation method using QR codes decoded with the ZXing library to establish the user’s initial position. Navigation paths are optimised using the A* algorithm, while ARCore integrates sensor data from the device’s gyroscope and accelerometer to enhance tracking accuracy. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…In past two decades, Internet has developed rapidly and has integrated in many aspects of human life. …”
Get full text
Get full text
Thesis -
13
Routing problem in rectangular mesh network using Dijkstra’s based Greedy method
Published 2018“…In order to achieve this objective, each net need to be routed as shortest as possible. Therefore, developing a shortest path based routing algorithm is in need. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Motion estimation on homogenous surface for around view monitoring system
Published 2020“…The procedure is time-consuming and increases the cost of development. We propose to develop two ultra-wide-angle cameras located on the front and rear vehicle integrated with the motion estimation (ME) algorithm to produce a parking bird eye view and forward/backward trajectory lines. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Performance analysis of pair-wise error probability for 1/3 and 1/4 subcarrier mapping ICI-SC scheme in STFBC MIMO-OFDM system / Norhayati Abdullah
Published 2015“…ICI and maximum frequency diversity can also be achieved by manipulating the Space Time Frequency Block Codes (STFBCs) that uses spatial, time and frequency diversities which is implemented in the MIMO-OFDM system. …”
Get full text
Get full text
Thesis -
16
Design of DNA fragment assembly using IWP method on application-specific integrated-circuit / Hasniliati Hassan
Published 2017“…The key innovation is to implement DNA sequence assembly algorithms on ASIC to make it a synthesisable IP block. …”
Get full text
Get full text
Thesis
