Search Results - (( developing indicates window algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing indicates »
- implication based »
- window algorithm »
- java implication »
-
1
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…The outcomes indicate that the EWR algorithm outperformed the baseline clustering algorithms. …”
Article -
2
-
3
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…A robust strategy, called the Pseudo Randomized Search Strategy (PRSS) has been developed to counter the effect of this AS policy. …”
Get full text
Get full text
Article -
4
Retinal image blood vessel extraction and quantification with Euclidean distance transform approach
Published 2020“…The significantly high accuracy in this newly developed vessel diameter quantification algorithm indicates excellent potential for further development, evaluation, validation, and integration into ophthalmic diagnostic instruments.…”
Get full text
Get full text
Get full text
Article -
5
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
6
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…The results indicated that the Decision Tree and Random Forest algorithms provided the best detection accuracy at 96%, followed by the K-NN algorithm at 95%. …”
Get full text
Get full text
Get full text
Article -
7
A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh
Published 2019“…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
Get full text
Get full text
Get full text
Thesis -
8
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
Epileptic seizure detection using the singular values of EEG signals
Published 2013“…The SVD is applied sequentially on a sliding window of one second width of EEG data and the r singular values are obtained and used to indicate sudden changes in the signals. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The parallel computing laboratory is configured for homogeneous systems using MATLAB Distributed Computing Server (MDCS) with Windows 7 operating system. The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
Get full text
Get full text
Thesis -
11
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
12
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…The core principle is to keep the relatively important instruction in cache memory from being evicted. The development of the HAS model is based on the idea of hierarchical temporal memory (HTM) developed by Numenta Inc. …”
Get full text
Get full text
Thesis -
13
Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors
Published 2017“…(PLS-SEM)version 3.2.3). Six hypotheses are developed in the study. Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
Get full text
Get full text
Get full text
Thesis -
14
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…As a consequence, we develop four cryptanalysis methods by which to show that N = p2q can be factored in polynomial time under certain conditions. …”
Get full text
Get full text
Thesis -
15
Auditory Evoked Potentials (AEPs) Response Classification: A Fast Fourier Transform (FFT) and Support Vector Machine (SVM) Approach
Published 2022“…The maximum classification accuracy of the developed SVM model with FFT feature was observed 95.29% (10 s time windows) which clearly indicates that the method provides a very encouraging performance for detecting the AEPs responses..…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Monitoring cathodic protection system for underground pipeline
Published 2013“…A local server running on windows platform was used to capture and display the readings on graph. …”
Get full text
Get full text
Thesis -
17
Design and Analysis of a Dynamic Space-Code Multiple Access with Large Area Synchronous Scheme Using the Smart Antenna System
Published 2007“…The spreading sequences of Large Area Synchronous Even Ternary (LAS-ET) which exhibited an interference free window (IFW) in their correlation are exploited here. …”
Get full text
Get full text
Thesis
