Search Results - (( java implementation _ algorithm ) OR ( ((program using) OR (problem using)) sparse algorithm ))
Search alternatives:
- java implementation »
- sparse algorithm »
- program using »
-
1
Counting roots of the Polynomial systems by using mixed volume of the Newton polytopes / Nur Suhailah Norazhar, Nur Ain Sofiya Zainuri and Nor Suhada Mohd Rosdi
Published 2024“…Since the study dealing with the sparse polynomial systems with two variables, to derive the sparse matrices, the developed Maple program, “multires.mpl” is used. …”
Get full text
Get full text
Student Project -
2
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…The research results suggested that SOM has a limitation of poor performance on sparse data set. Thus, the research introduced the improved SOM algorithm by using a Jaccard NM (SOM-JNM). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…The research results suggested that SOM has a limitation of poor perfonnance on sparse data set. Thus, the research introduced the improved SOM algorithm by using a Jaccard NM (SOM-JNM). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The designed hybrid architecture and framework were tested using the above quantum algorithms and the existing quantum algorithms. …”
Get full text
Get full text
Thesis -
5
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…In some cases, they are quite distant and sparseness. This uniqueness of Y-STR data has become problematic in partitioning the data using the existing partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
6
-
7
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Hence, a new fusion framework namely, Collaborative Framework of Algorithms (CoFA) is proposed, to pursue accurate recovery of the sparse signals from few linear measurements. …”
Get full text
Get full text
Thesis -
8
-
9
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks
Published 2019“…The multilayered version of CSC(ML-CSC) is shown to be connected to forward pass of CNNs and dictionary learning and sparse coding algorithms of this model are analyzed for solving classification and inverse problems in image processing. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Arbitrary Lagrangian-Eulerian Form of Flowfield Dependent Variation (ALE-FDV) Method for 3D Problems
Published 2014“…The formulation itself yields a sparse matrix, which can be solved using any iterative algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Speech compression using compressive sensing on a multicore system
Published 2011“…Finally, to speed up the process, the proposed algorithm will be implemented in a multicore system, i.e. six cores, using Single Program Multiple Data (SPMD) parallel paradigm.…”
Get full text
Get full text
Proceeding Paper -
13
-
14
Taylor-Bird Swarm Optimization-Based Deep Belief Network For Medical Data Classification
Published 2022“…Then, the feature selection process is performed using sparse fuzzy-c-means (FCM) for selecting significant features to classify medical data. …”
Get full text
Get full text
Thesis -
15
Arbitrary lagrangian-eulerian form of flowfield dependent variation method for moving boundary problems
Published 2014“…The formulation itself yields a sparse matrix, which can be solved using any iterative algorithm for linear systems of algebraic equations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
17
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
18
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
19
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
20
