Search Results - (( java implementation modified algorithm ) OR ( using fourier learning algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- fourier learning »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Development of an interactive learning tool for analysis of fast fourier transform from butterfly diagram
Published 2023“…Suitable example for the generation of fast Fourier transform using butterfly diagram will be used in the development of the butterfly diagram software. …”
text::Thesis -
4
GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm
Published 2013Get full text
Get full text
Final Year Project -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
CLASSIFICATION OF BEARING FAULTS USING EXTREME LEARNING MACHINE ALGORITHMS
Published 2017“…Therefore, this project introduces three learning algorithms which are Extreme Learning Machine (ELM), Finite Impulse Response Extreme Learning Machine (FIR-ELM) and Discrete Fourier Transform Extreme Learning Machine (DFT-ELM) to improve the bearing fault diagnosis accuracy and shorten the time used to train and test the neural network.…”
Get full text
Get full text
Final Year Project -
8
Spectral analysis of discrete fourier transform (DFT) using Matlab
Published 2023“…In this project, signal is analyzed by applying Discrete Fourier Transform (DFT), specifically Fast Fourier Transform (FFT) algorithm in MATLAB. …”
text::Thesis -
9
K-means Clustering Analysis for EEG Features of Situational Interest Detection in Classroom Learning
Published 2021“…This paper proposes a method to detect situational interest in classroom learning using k-means algorithms. The developed algorithm in this paper had been tested on features from ten students who experienced mathematics learning in a classroom. …”
Get full text
Get full text
Conference or Workshop Item -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
-
12
Simulation of Orthogonal Frequency Division Multiplexing (OFDM) signaling
Published 2008Get full text
Learning Object -
13
Watermarking in safe region of frequency domain using complex-valued neural network
Published 2010“…It has been discovered by computational experiments that Complex Back-Propagation (CBP) algorithm is well suited for learning complex pattern, and it has been reported that this ability can successfully be applied in image processing with complex values. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…This paper reviews various types of classification and regression algorithms in chemometric analysis to demonstrate the capabilities of these algorithms for use in food authentication processes. …”
Get full text
Get full text
Get full text
Article -
15
Damageless Digital Watermarking Using Complex-valued Artificial Neural Network
Published 2010“…In this paper, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. …”
Get full text
Get full text
Get full text
Article -
16
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
Get full text
Get full text
Thesis -
17
Damageless digital watermarking using complex-valued artificial neural network
Published 2010“…In this paper, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. …”
Get full text
Get full text
Get full text
Article -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
Published 2015“…In this study, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. …”
Get full text
Get full text
Monograph -
20
Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System
Published 2012“…This paper proposes an intelligent algorithm using an adaptive neural- Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
Get full text
Get full text
Get full text
Article
