Search Results - (( java implementation during algorithm ) OR ( parameter data compression algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- during algorithm »
- data compression »
- parameter »
-
1
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…In this paper, we propose a new lossless compression algorithm that can handle small data communication in WSNs. …”
Get full text
Get full text
Get full text
Article -
2
Predicting uniaxial compressive strength using Support Vector Machine algorithm
Published 2019“…This paper presents the application of Support Vector Machine (SVM) algorithm to predict the UCS. An algorithm has been tested on a series of rock data using dry density and velocity parameters. …”
Get full text
Get full text
Article -
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Speech compression using compressive sensing on a multicore system
Published 2011“…Compressive sensing (CS) is a new approach to simultaneous sensing and compression of sparse and compressible signals, i.e. speech signal. …”
Get full text
Get full text
Proceeding Paper -
5
-
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
7
Artificial neural network (ANN) modeling & validation to predict compression index of tropical soft soil
Published 2010“…In current study, bore hole data was collected from JKR, Kuching to train and validate the neural network for the prediction of settlement rather than compression index (Cc). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
-
9
Machine learning models for predicting the compressive strength of concrete with shredded pet bottles and m sand as fine aggregate
Published 2025“…This study investigates the use of ML algorithms to predict the compressive strength of grade 30 concrete, incorporating shredded PET bottles and M-sand as fine aggregates. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Currently, the selection of cluster head is based on residual energy and several parameters. The data routing to the based station is solely relying on cluster head. …”
Get full text
Get full text
Thesis -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
14
Implementing data hiding in still images / lman Hazwam Abd. Halim and Roshidi Din
Published 2004“…Data hiding refers to the nearly invisible embedding of information within various host data sets and one of them is by using still images. …”
Get full text
Get full text
Conference or Workshop Item -
15
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
16
Educational project on a simple voice identification using mel-frequency cepstrum coefficients and vector quantization
Published 2008“…The estimation fundamental frequency is performed with Harmonic Product Spectrum (HPS) algorithm, whilst MFCC is calculated using Discrete Cosine Transform, then, is modeled with Vector Quantization to compress the size of data to be processed and to assist identification.…”
Get full text
Get full text
Proceeding Paper -
17
Analysis of the ECG signal using SVD-based parametric modelling technique
Published 2011“…A good compression ratio per beat has been obtained using the proposed algorithm which is quite satisfactory when compared to other techniques.…”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Modelling and calibration of high-pressure direct injection compressed natural gas engine
Published 2021“…The calibration framework consists of the development of the data-driven model by using ANN and ECU parameters optimisation by using GA. …”
Get full text
Get full text
Thesis -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
