Search Results - (( java application window algorithm ) OR ( dramatic implementation based algorithm ))
Search alternatives:
- dramatic implementation »
- implementation based »
- application window »
- java application »
- window algorithm »
-
1
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
2
Big data clustering using grid computing and ant-based algorithm
Published 2013“…However, there are many challenges in dealing with big data such as storage, transfer, management and manipulation of big data.Many techniques are required to explore the hidden pattern inside the big data which have limitations in terms of hardware and software implementation. This paper presents a framework for big data clustering which utilizes grid technology and ant-based algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…We have chosen four neighborhood based algorithms which are commonly used in optimization problems and divided them in newly implemented and re-implemented category. …”
Get full text
Get full text
Thesis -
4
Implementing case-based reasoning approach to framework documentation
Published 2023“…This paper discusses and implements the case-based reasoning (CBR) approach to documenting a framework. …”
Conference paper -
5
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
6
Mobile Travel Guide For Tourism
Published 2007“…Methodology that is practically adequate to be implemented in this system is Phased Development-based methodology. …”
Get full text
Get full text
Final Year Project -
7
Students’ attitude towards video-based learning: machine learning analysis with rapid software / Abdullah Sani Abd Rahman ... [et al.]
Published 2022“…The recent computer and Internet technologies have dramatically impacted many facets of education. There has been a rapid rise mainly since the COVID19 pandemic in the use of video-based learning implemented via online classroom setting. …”
Get full text
Get full text
Get full text
Article -
8
A Focal load balancer based algorithm for task assignment in cloud environment
Published 2019“…Comparisons with the krill-LB and agent-based algorithms show that the new system provides a reduction in average wait time, a significant increase in throughput, and a dramatic reduction in CPU time consumption.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
An automatic diacritization algorithm for undiacritized Arabic text
Published 2017“…Moreover, this research is to implement and evaluate the accuracy of the algorithm for dialectal Arabic text. …”
Get full text
Get full text
Get full text
Thesis -
10
Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter
Published 2023“…The proposed algorithm also improved the design by eliminating the needs of low pass filter as others time domain algorithms. …”
Get full text
Get full text
Get full text
Article -
11
A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings
Published 2025“…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
Get full text
Get full text
Get full text
Article -
12
A new parameterized architectural design for SENSE reconstruction
Published 2014“…Hardware platforms for specific reconstruction algorithms dramatically increase the power efficiency and decrease the execution time. …”
Get full text
Get full text
Conference or Workshop Item -
13
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016“…T-way interaction testing has been extensively exploited resulting into many prototypes strategy implementations. Recently, there are growing interests for adopting optimization algorithms as the basis of the newly developed strategies contributing to the new and upcoming search based software testing (SBST) area of research. …”
Get full text
Get full text
Get full text
Article -
14
-
15
High-Speed Implementations Of Fractal Image Compression For Low And High Resolution Images
Published 2018“…The major drawback of FIC is that it is a time consuming algorithm, especially when a full search is attempted. …”
Get full text
Get full text
Thesis -
16
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
Get full text
Get full text
Thesis -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…The algorithm mentioned in the study reduces the computational complexity problem which is one of the main issues that accompany currently used tap filter algorithms, such as (LMS) and (RLS). …”
Get full text
Get full text
Get full text
Thesis -
19
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…The technology lends itself well to a variety of uses and applications, including security access control for cell phones (to eliminate cell phone fraud), ATM manufacturers (to eliminate pin # fraud) and automobile manufacturers (to dramatically reduce theft and carjacking). In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Beyond the classroom: digital language learning in the Malaysian context
Published 2024“…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
Get full text
Get full text
Get full text
Article
