Search Results - (( developing embedding process algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…This research explores the usage of embedded system technology in developing a vision system to aid the process of monitoring traffic surveillance video. …”
    Get full text
    Thesis
  3. 3

    Implementation and Optimization of Human Tracking System Using ARM Embedded Platform by Teoh, Shen Khang, Yap, Vooi Voon, Soh, Chit Siang, Sebastian , Patrick

    Published 2012
    “…Computer vision is a field that includes methods for acquiring, processing, analyzing and understanding images. In the embedded world, computer vision applications have to fight with limited processing power and limited resources to achieve optimized algorithms and high performance. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation Of Hardware Software Partitioning In Embedded System by Mohd Nor, Masyirah

    Published 2018
    “…Hardware/Software partitioning is a crucial problem in embedded system. It resides on deciding which process of embedded system should be executed on specific hardware and which one on software. …”
    Get full text
    Get full text
    Monograph
  8. 8

    An embedded processing of differential pulse voltammetry (DPV) data using ARM processor (LPC1768) by Mazaheri, Amin, Mohd Isa, Maryam, Mohd Sidek, Roslina, Yusof, Nor Azah

    Published 2015
    “…This paper reports an embedded system design of a digital signal processing (DSP) unit for an In-situ analyzing of electrochemical data obtained by differential pulse voltammetry (DPV) from a three-electrode cell. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Enhanced Steganography Framework Based On Lossless Compression And Histogram by Kasasbeh, Dima Suliman Mohammad

    Published 2024
    “…The Embedding Map Generation Model proposed two techniques to determine the best RGB channels and generate the embedding location map before the embedding process. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing real time heavy metal detection using embedded portable signal processing unit by Mazaheri, Amin, Mohd Isa, Maryam, Mohd Sidek, Roslina, Yusof, Nor Azah

    Published 2019
    “…On-line multiple peak detection and Gaussian distribution algorithms have been developed onto processor for the detecting and analyzing heavy metals of various applications. …”
    Get full text
    Get full text
    Article
  11. 11

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection by Chia, Yee Shin

    Published 2015
    “…Subsequently, the integration of embedded correlation-based filtering algorithm has further increased the classification accuracy of training process and testing process by 4.93% and 14.73% respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A New Hybrid Embedding Method in Iris Biometric System by Zainal Abidin, Zaheera, Manaf, Mazani, Shibghatullah, Abdul Samad, Jusoff, Kamaruzaman, Ahmad, Rabiah, Ayop, Zakiah, Anawar, Syarulnaziah, Shaaban, Azizah, Yusoff, Mariana

    Published 2013
    “…The embedding process creates the embedded iris feature and the reverse process of embedding is known as de-embedding. …”
    Get full text
    Get full text
    Article
  14. 14

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…The experimental analysis focused on the AAḃ algorithm's performance on embedded platforms, namely, the Raspberry Pi microcomputer and microcontroller (ARM Cortex-M7) platforms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Sentiment analysis for airline services on Twitter using deep learning with word embedding / Mawada Mohamed Nour El Daim El Khalifa by Mawada Mohamed , Nour El Daim El Khalifa

    Published 2020
    “…Meanwhile, in recent years, Deep Learning algorithms for Sentiment Analysis has emerged as one of the most popular algorithms, which provides automatic feature extraction, rich representation capabilities, and better performance than most of the traditional learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim by Abdul Rahim, Siti Rafidah

    Published 2019
    “…This thesis presents a novel Embedded Meta Evolutionary–Firefly Algorithm-Artificial Neural Network for Multi-DG planning in distribution system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…To diminish the imposed distortion by data embedding in edge blocks, we employ LSB and MPC algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…Memory built-in self-test (BIST) is a widely used technique to allow the self-test and self-checking of the embedded memories on chips after the fabrication process. …”
    Get full text
    Get full text
    Get full text
    Article