Search Results - (( java implementation case algorithm ) OR ( using complex valued algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- valued algorithm »
- case algorithm »
- using complex »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
6
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
7
-
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Damageless Digital Watermarking Using Complex-valued Artificial Neural Network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Damageless digital watermarking using complex-valued artificial neural network
Published 2010“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…The complex values form the input data of the Complex Back-Propagation (CBP) algorithm. …”
Get full text
Get full text
Monograph -
14
Watermarking in safe region of frequency domain using complex-valued neural network
Published 2010“…Fast Fourier Transform, FFT is used to obtain the complex values (real and imaginary part) of the host image. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
-
17
Distortion-free embedding in the optic disk of retina fundus images using complex-valued neural network
Published 2011“…This paper presents a distortion-free method for embedding data in the optic nerves of retina images (fundus) accomplished by Complex-Valued Neural Networks. Features of the images are modeled in Fast Fourier Transform to obtain the complex values which serves as inputs to Complex-Valued Neural Networks, (CVNN). …”
Get full text
Get full text
Get full text
Article -
18
Performance Analysis of ARMA based Magnetic Resonance Imaging (MRI) Reconstruction Algorithm
Published 2012“…In this research work, a new method of Autoregressive Moving Average (ARMA) coefficients using three layer complex valued neural network ARMA techniques (CVNN-CARMA) with split complex-value weight and adaptive linear activation functions is hereby proposed. …”
Get full text
Get full text
Monograph -
19
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis -
20
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis
