Search Results - (( developing coding means algorithm ) OR ( java evaluation study algorithm ))

Refine Results
  1. 1

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…As for WXES3l82, the thesis cover the development of programming code, the code implementation and testing and the evaluation including discussion about the problem/constraints meed in the coding program development. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    WAVELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by Chai, Beng Seow

    Published 2007
    “…This project is about the implementation ofWavelet-DCT intra-frame coder for video coding applications. Wavelet-DCT is a novel algorithm that uses Forward Discrete Wavelet Transform (DWT) to compute DCT. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…Therefore, a corresponding fringe analysis algorithm was developed for De Bruijn colour-coded fringe pattern to circumvent the conventional phase unwrapping techniques which are unreliable and time-consuming. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Reported malicious codes incident within malaysia’s landscape: time series modelling and a timeline analysis by Muhammad Nadzmi, Md Azam

    Published 2022
    “…The best model is chosen by the least values of mean absolute error (MAE), root mean squared error (RMSE), and mean absolute percentage error (MAPE). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. …”
    Get full text
    Get full text
    Article
  9. 9

    Design and evaluation of multidimensional turbo product coded MIMO-OFDM system by Muladi, Muladi

    Published 2007
    “…The initial work is developing the dimensional-based reading order (DBRO) algorithm for generating the MDTPC codeword sequences. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-Time Implementation Of LPC-10 Codec On TMS320C6713 DSP by Talib Alshammari, Wissam

    Published 2012
    “…During last two decades various speech coding algorithms have been developed. The range of toll speech frequency is from 300 Hz- 3400 Hz. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system by Abdolee, Reza

    Published 2006
    “…Therefore in this part QR decomposition algorithm has been investigated as a solution. For doing so, the performance analysis between QR decomposition and LS algorithm in terms of MSE (Mean Square Error) and BER (Bit Error Rate) has been done using simulations software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The appropriate Java codes are developed for solve this task. The developed patterns are applied in the field of real-time analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid multiobjective genetic algorithm for integrated dynamic scheduling and routing of jobs and automated guided vehicles in flexible manufacturing systems by Umar, Umar Ali

    Published 2014
    “…Computational experiments were conducted on the developed algorithm coded in Matlab to test the effectiveness of the algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…The study of Bat Algorithm is achieved the purpose of this research. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Neural network-based codebook search for image compression by Bodruzzaman, M., Gupta, R., Karim, M.R., Bodruzzaman, S.

    Published 2000
    “…In this work, a generic codebook is developed using non-causal Differential Pulse Coded Modulation (DPCM) with residual mean removal and vector quantization using Linde, Buzo and Gray (LBG) method. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item