Search Results - (( java implementation bat algorithm ) OR ( parameter data compression algorithm ))
Search alternatives:
- java implementation »
- implementation bat »
- data compression »
- bat algorithm »
- parameter »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article -
3
Predicting uniaxial compressive strength using Support Vector Machine algorithm
Published 2019“…This paper presents the application of Support Vector Machine (SVM) algorithm to predict the UCS. An algorithm has been tested on a series of rock data using dry density and velocity parameters. …”
Get full text
Get full text
Article -
4
Speech compression using compressive sensing on a multicore system
Published 2011“…Compressive sensing (CS) is a new approach to simultaneous sensing and compression of sparse and compressible signals, i.e. speech signal. …”
Get full text
Get full text
Proceeding Paper -
5
-
6
Artificial neural network (ANN) modeling & validation to predict compression index of tropical soft soil
Published 2010“…In current study, bore hole data was collected from JKR, Kuching to train and validate the neural network for the prediction of settlement rather than compression index (Cc). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
-
8
Machine learning models for predicting the compressive strength of concrete with shredded pet bottles and m sand as fine aggregate
Published 2025“…This study investigates the use of ML algorithms to predict the compressive strength of grade 30 concrete, incorporating shredded PET bottles and M-sand as fine aggregates. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Currently, the selection of cluster head is based on residual energy and several parameters. The data routing to the based station is solely relying on cluster head. …”
Get full text
Get full text
Thesis -
10
Implementing data hiding in still images / lman Hazwam Abd. Halim and Roshidi Din
Published 2004“…Data hiding refers to the nearly invisible embedding of information within various host data sets and one of them is by using still images. …”
Get full text
Get full text
Conference or Workshop Item -
11
Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization
Published 2008“…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
Get full text
Get full text
Proceeding Paper -
12
Analysis of the ECG signal using SVD-based parametric modelling technique
Published 2011“…A good compression ratio per beat has been obtained using the proposed algorithm which is quite satisfactory when compared to other techniques.…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Modelling and calibration of high-pressure direct injection compressed natural gas engine
Published 2021“…The calibration framework consists of the development of the data-driven model by using ANN and ECU parameters optimisation by using GA. …”
Get full text
Get full text
Thesis -
14
Elgamal digital signature scheme with integrated CFEA-technique
Published 2016“…In order to provide good level of security, proper parameters must be used in this scheme. This includes the size of the parameters. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Elgamal Digital Signature Scheme With Integrated CFEA-Technique
Published 2016“…In order to provide good level of security, proper parameters must be used in this scheme. This includes the size of the parameters. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Optimization of solenoid driver and controller for gaseous fuel high-pressure direct injector using model-based approach
Published 2022“…Thus, the purpose of this study is to identify the most influential parameters of the injector, construct an analytical and data-driven model of the injector, conduct the model-based optimization of the injector and verify the optimal injector setup via simulation and experiment. …”
Get full text
Get full text
Thesis -
17
Modeling and simulation of forward Al extrusion process using FEM
Published 2014“…The extrusion process was modeled as isothermal, which means that the billet material was preheated at a specific temperature and then pressured into the circular die, with extrusion ratio 3.3. Optimized algorithms for extrusion parameters were proposed regarding the concluded simulating results. …”
Get full text
Get full text
Get full text
Article -
18
Performance analysis of voice codec for VoIP
Published 2008“…Finally, G.729 the high level compression is the proper technique for many user and heavy data only when the quality is not taken into account.…”
Get full text
Get full text
Get full text
Thesis -
19
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…Obfuscatable Aggregatable Signcryption (OASC) is the combination of cryptography technique such as digital signature with data encryption and obfuscation to protect data in the IoT system. …”
Get full text
Get full text
Thesis -
20
A Pioneering Approach to Predicting the Shear Strength of RC Beams by Employing Artificial Intelligence Techniques
Published 2024“…Nevertheless, the ANFIS architecture proposed, which incorporates a hybrid learning algorithm, outperformed the multilayer feedforward ANN that utilizes the backpropagation algorithm. …”
Get full text
Get full text
Get full text
Article
