Search Results - (( developing indicates window algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…The outcomes indicate that the EWR algorithm outperformed the baseline clustering algorithms. …”
    Article
  2. 2
  3. 3

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…A robust strategy, called the Pseudo Randomized Search Strategy (PRSS) has been developed to counter the effect of this AS policy. …”
    Get full text
    Get full text
    Article
  4. 4

    Retinal image blood vessel extraction and quantification with Euclidean distance transform approach by Kuryati, Kipli, Mohammed Enamul, Hoque, Lik, Thai Lim, Tengku Mohd Afendi, Zulcaffle, Siti Kudnie, Sahari, Muhammad Hamdi, Mahmood

    Published 2020
    “…The significantly high accuracy in this newly developed vessel diameter quantification algorithm indicates excellent potential for further development, evaluation, validation, and integration into ophthalmic diagnostic instruments.…”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…The results indicated that the Decision Tree and Random Forest algorithms provided the best detection accuracy at 96%, followed by the K-NN algorithm at 95%. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A voting-based hybrid machine learning approach for fraudulent financial data classification / Kuldeep Kaur Ragbir Singh by Kuldeep Kaur , Ragbir Singh

    Published 2019
    “…The empirical results positively indicate that the hybrid model with the sliding window method is able to yield a good accuracy rate of 82.4% in detecting fraud cases in real world credit card transactions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Epileptic seizure detection using the singular values of EEG signals by Shahid, Arslan, Kamel, Nidal, Malik, Aamir Saeed, Jatoi, Munsif Ali

    Published 2013
    “…The SVD is applied sequentially on a sliding window of one second width of EEG data and the r singular values are obtained and used to indicate sudden changes in the signals. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…The parallel computing laboratory is configured for homogeneous systems using MATLAB Distributed Computing Server (MDCS) with Windows 7 operating system. The designed algorithms are implemented for EHD equations and their performance is evaluated by using different performance indicators. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…The core principle is to keep the relatively important instruction in cache memory from being evicted. The development of the HAS model is based on the idea of hierarchical temporal memory (HTM) developed by Numenta Inc. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors by Lateef, Saheed Ademola

    Published 2017
    “…(PLS-SEM)version 3.2.3). Six hypotheses are developed in the study. Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…As a consequence, we develop four cryptanalysis methods by which to show that N = p2q can be factored in polynomial time under certain conditions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Auditory Evoked Potentials (AEPs) Response Classification: A Fast Fourier Transform (FFT) and Support Vector Machine (SVM) Approach by Islam, Md Nahidul, Norizam, Sulaiman, Rashid, Mamunur, Mahfuzah, Mustafa, Md Jahid, Hasan

    Published 2022
    “…The maximum classification accuracy of the developed SVM model with FFT feature was observed 95.29% (10 s time windows) which clearly indicates that the method provides a very encouraging performance for detecting the AEPs responses..…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…A local server running on windows platform was used to capture and display the readings on graph. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design and Analysis of a Dynamic Space-Code Multiple Access with Large Area Synchronous Scheme Using the Smart Antenna System by Ng, Chee Kyun

    Published 2007
    “…The spreading sequences of Large Area Synchronous Even Ternary (LAS-ET) which exhibited an interference free window (IFW) in their correlation are exploited here. …”
    Get full text
    Get full text
    Thesis