Search Results - (( developing embedding process algorithm ) OR ( java implementation case algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…This research explores the usage of embedded system technology in developing a vision system to aid the process of monitoring traffic surveillance video. …”
    Get full text
    Thesis
  5. 5
  6. 6

    Implementation and Optimization of Human Tracking System Using ARM Embedded Platform by Teoh, Shen Khang, Yap, Vooi Voon, Soh, Chit Siang, Sebastian , Patrick

    Published 2012
    “…Computer vision is a field that includes methods for acquiring, processing, analyzing and understanding images. In the embedded world, computer vision applications have to fight with limited processing power and limited resources to achieve optimized algorithms and high performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  10. 10

    Implementation Of Hardware Software Partitioning In Embedded System by Mohd Nor, Masyirah

    Published 2018
    “…Hardware/Software partitioning is a crucial problem in embedded system. It resides on deciding which process of embedded system should be executed on specific hardware and which one on software. …”
    Get full text
    Get full text
    Monograph
  11. 11

    An embedded processing of differential pulse voltammetry (DPV) data using ARM processor (LPC1768) by Mazaheri, Amin, Mohd Isa, Maryam, Mohd Sidek, Roslina, Yusof, Nor Azah

    Published 2015
    “…This paper reports an embedded system design of a digital signal processing (DSP) unit for an In-situ analyzing of electrochemical data obtained by differential pulse voltammetry (DPV) from a three-electrode cell. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Enhanced Steganography Framework Based On Lossless Compression And Histogram by Kasasbeh, Dima Suliman Mohammad

    Published 2024
    “…The Embedding Map Generation Model proposed two techniques to determine the best RGB channels and generate the embedding location map before the embedding process. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Enhancing real time heavy metal detection using embedded portable signal processing unit by Mazaheri, Amin, Mohd Isa, Maryam, Mohd Sidek, Roslina, Yusof, Nor Azah

    Published 2019
    “…On-line multiple peak detection and Gaussian distribution algorithms have been developed onto processor for the detecting and analyzing heavy metals of various applications. …”
    Get full text
    Get full text
    Article
  16. 16

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection by Chia, Yee Shin

    Published 2015
    “…Subsequently, the integration of embedded correlation-based filtering algorithm has further increased the classification accuracy of training process and testing process by 4.93% and 14.73% respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A New Hybrid Embedding Method in Iris Biometric System by Zainal Abidin, Zaheera, Manaf, Mazani, Shibghatullah, Abdul Samad, Jusoff, Kamaruzaman, Ahmad, Rabiah, Ayop, Zakiah, Anawar, Syarulnaziah, Shaaban, Azizah, Yusoff, Mariana

    Published 2013
    “…The embedding process creates the embedded iris feature and the reverse process of embedding is known as de-embedding. …”
    Get full text
    Get full text
    Article
  19. 19

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…The experimental analysis focused on the AAḃ algorithm's performance on embedded platforms, namely, the Raspberry Pi microcomputer and microcontroller (ARM Cortex-M7) platforms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa by Mawada Mohamed , Nour El Daim El Khalifa

    Published 2020
    “…Meanwhile, in recent years, Deep Learning algorithms for Sentiment Analysis has emerged as one of the most popular algorithms, which provides automatic feature extraction, rich representation capabilities, and better performance than most of the traditional learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis