Search Results - (( developing wavelet decomposition algorithm ) OR ( java implementation using algorithm ))
Search alternatives:
- decomposition algorithm »
- wavelet decomposition »
- implementation using »
- java implementation »
- developing wavelet »
- using algorithm »
-
1
A Real time specific weed discrimination system using multi-Level wavelet decomposition
Published 2009“…The developed algorithm was used for the real time specific weed discrimination employing multi-level wavelet decomposition. …”
Get full text
Get full text
Citation Index Journal -
2
A Real time specific weed discrimination system using multi-Level wavelet decomposition
Published 2009“…The developed algorithm was used for the real time specific weed discrimination employing multi-level wavelet decomposition. …”
Get full text
Get full text
Citation Index Journal -
3
Distinguishing Micro-Scale Voltage Disturbances Using Wavelet Decomposition Techniques
Published 2014“…All the modelling and classification processes are performed in MATLAB where wavelet-1D toolbox and MATLAB algorithm are developed and employed. …”
Get full text
Get full text
Final Year Project -
4
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals
Published 2017“…The normal as well as epileptic EEG record-ings were first decomposed into various frequency bands by means of wavelet packet decomposition, and subsequently, statistical features at all developed nodes in the wavelet packet decomposition tree were derived. …”
Get full text
Get full text
Get full text
Article -
5
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Published 2018“…The normal as well as epileptic EEG recordings were frst decomposed into various frequency bands by means of wavelet packet decomposition, and subsequently, statistical features at all developed nodes in the wavelet packet decomposition tree were derived. …”
Get full text
Get full text
Article -
6
-
7
-
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
An optical flow measurement technique based on continuous wavelet transform
Published 2018“…The proposed technique is based on continuous wavelet transform and estimates the flow using the following steps: Decomposition of turbulent flow signal by using continuous wavelet transform (CWT), correlation coefficient estimation in which Fast Fourier Transform (FFT) algorithm was used, interpolation and peak detection for the estimated correlation coefficients, and finally, the velocity field estimation. …”
Get full text
Get full text
Article -
11
An optical flow measurement technique based on continuous wavelet transform
Published 2018“…The proposed technique is based on continuous wavelet transform and estimates the flow using the following steps: Decomposition of turbulent flow signal by using continuous wavelet transform (CWT), correlation coefficient estimation in which Fast Fourier Transform (FFT) algorithm was used, interpolation and peak detection for the estimated correlation coefficients, and finally, the velocity field estimation. …”
Get full text
Get full text
Article -
12
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
-
15
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
16
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
17
-
18
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
19
The trade-off between robustness and imperceptibility performance of watermarking technique with DWT and SCHUR decomposition for medical images
Published 2022“…This paper proposed a watermarking algorithm that applied discrete wavelet transfer (DWT) and Schur Decomposition to produce a watermarked image with high imperceptibility and robustness performance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
