Search Results - (( development case replication algorithm ) OR ( java data compression algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing by Abd, Wamidh Jwdat

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization of mobile robot path planning in semi-dynamic environment using genetic algorithm by Kasim Hawari, Mohd Zarifitri

    Published 2023
    “…Thus, this thesis aims to develop a mobile robot for industrial applications by leveraging a genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Towards a self-adaptive agent-based simulation model by Loo Y.L., Tang A.Y.C., Ahmad A., Mustapha A.

    Published 2023
    “…The capability to self-adapt will allow the model to be easily extended and replicated. The self-adapt capability is enabled by a governing algorithm within the model and is conceptually illustrated through a case study of crime report process ABS modelling. � 2005 - 2016 JATIT & LLS. …”
    Article
  7. 7

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Development of low-overhead soft error mitigation technique for safety critical neural networks applications by Khalid Adam, Ismail Hammad

    Published 2021
    “…Importantly, S-MTTMR decreased the percentage of errors that case misclassification (Malfunction) from 3.70% to 0.38% and 5.23% to 0.23%, for AlexNet and DenseNet, respectively. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A genome wide study of copy number variation associated with nasopharyngeal carcinoma in Malaysian Chinese identifies CNVs at 11q14.3 and 6p21.3 as candidate loci by Low, Joyce Siew Yong, Chin, Yoon Ming, Mushiroda, Taisei, Kubo, Michiaki, Govindasamy, Gopala Krishnan, Pua, Kin Choo, Yap, Yoke Yeow, Yap, Lee Fah, Subramaniam, Selva Kumar, Ong, Cheng Ai, Tan, Tee Yong, Khoo, Alan Soo Beng, The Malaysian NPC Study Group, Ng, Ching Ching

    Published 2016
    “…PennCNV and cnvPartition calling algorithms were applied for CNV calling. Taqman CNV assays and digital PCR were used to validate CNV calls and replicate candidate copy number variant region (CNVR) associations in a follow-up Malaysian Chinese (NPC cases, n = 465; and Healthy controls, n = 677) and Malay cohort (NPC cases, n = 114; Healthy controls, n = 124). …”
    Get full text
    Get full text
    Article
  13. 13

    Determination of transfer capability considering risk and reliability cost/ worth assessment in dynamic and static system cascading collapses / Nur Ashida Salim by Salim, Nur Ashida

    Published 2015
    “…The proposed research methodology involved developing an algorithm commenced with a fault occurrence and then followed by the propagation of power system component tripping events which is defined as the system cascading collapse. …”
    Get full text
    Get full text
    Thesis