Search Results - (( java application mining algorithm ) OR ( encoder implementation phase algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis gains information on the time required to encode the biometric image by implementing techniques of CPM and BPBM and measures their impact on the encoding duration. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    DSP BASED IMPLEMENTATION OF FIELD ORIENTED CONTROL OF THREE-PHASE INDUCTION MOTOR DRIVES by Sulaiman, Marizan, Patakor, Fizatul Aini, Ibrahim, Zulkifilie

    Published 2013
    “…The objective of this paper is to presents a practical implementation of field oriented control of three-phase induction motor based on Space Vector Pulse Width Modulation technique using Digital Signal Processing (DSP) board TMS320F2812. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…This study is divided into several phases including preliminary study, experimental design, algorithm enhancement and result analysis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    The design of viterbi decoder for low power consumption space time trellis code without adder architecture using RTL model by Abu, Mohd Azlan, Harun, Harlisya, Harmin, Mohammad Yazdi, Abdul Wahab, Noor Izzri, Abdul Kadir, Muhd Khairulzaman

    Published 2016
    “…Findings – The results showed that the STTC decoder can successfully decipher the encoded symbols from the STTC encoder and can fully recover the original data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…The outcome was that we can encrypt the X-ray image and the people with decryption key only can view the image. In the experiment phase, 3 of the selected algorithms was implemented as similar language as possible to produce more reliable result. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Generation and statistical analysis of chaos-based pseudorandom sequences by Hina, Aliyu Danladi

    Published 2019
    “….), thereby, suggesting its ability to be implemented in a cryptographic algorithm. The pro- posed generator has been analyzed in two phases with the first phase subjected to correlation (fast) attack and the second phase by convolutional encoder based correlation attack. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Indirect Rotor Field Oriented Control of Induction Motor With Rotor Time Constant Estimation by Moh'd Radwan, Eyad Moh'd

    Published 2004
    “…A simple yet effective rotor time constant identification method is presented and used for updating the slip calculator used by the IRFOC algorithms. A complete simulation model of an induction motor and IRFOC scheme is presented and tested using SIMULINWMATLAB, and experimentally implemented on a DSP Board (MCK243j without any need for voltage phase sensors. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Three-Description Scalar And Lattice Vector Quantization Techniques For Efficient Data Transmission by Teo, Hui Ting

    Published 2015
    “…As this thesis suggests a new labeling algorithm that uses lattice 4 for three description MDC system. …”
    Get full text
    Get full text
    Thesis