Search Results - (( java implementation modified algorithm ) OR ( using fourier learning algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Development of an interactive learning tool for analysis of fast fourier transform from butterfly diagram by Mohamad Syeihri Bin Mohamad Ismail

    Published 2023
    “…Suitable example for the generation of fast Fourier transform using butterfly diagram will be used in the development of the butterfly diagram software. …”
    text::Thesis
  4. 4
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    CLASSIFICATION OF BEARING FAULTS USING EXTREME LEARNING MACHINE ALGORITHMS by TEH, CHOON KEONG

    Published 2017
    “…Therefore, this project introduces three learning algorithms which are Extreme Learning Machine (ELM), Finite Impulse Response Extreme Learning Machine (FIR-ELM) and Discrete Fourier Transform Extreme Learning Machine (DFT-ELM) to improve the bearing fault diagnosis accuracy and shorten the time used to train and test the neural network.…”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Spectral analysis of discrete fourier transform (DFT) using Matlab by Wong Shen Yuong

    Published 2023
    “…In this project, signal is analyzed by applying Discrete Fourier Transform (DFT), specifically Fast Fourier Transform (FFT) algorithm in MATLAB. …”
    text::Thesis
  9. 9

    K-means Clustering Analysis for EEG Features of Situational Interest Detection in Classroom Learning by Othman, E.S., Faye, I., Babiker, A., Hussaan, A.M.

    Published 2021
    “…This paper proposes a method to detect situational interest in classroom learning using k-means algorithms. The developed algorithm in this paper had been tested on features from ten students who experienced mathematics learning in a classroom. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Watermarking in safe region of frequency domain using complex-valued neural network by Olanrewaju, Rashidah Funke, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Aburas, A. A., Zeki, Akram M.

    Published 2010
    “…It has been discovered by computational experiments that Complex Back-Propagation (CBP) algorithm is well suited for learning complex pattern, and it has been reported that this ability can successfully be applied in image processing with complex values. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Integration of spectroscopy and chemometric analysis for food authentication: a review by Basri, Katrul Nadia

    Published 2025
    “…This paper reviews various types of classification and regression algorithms in chemometric analysis to demonstrate the capabilities of these algorithms for use in food authentication processes. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Damageless Digital Watermarking Using Complex-valued Artificial Neural Network by Olanweraju, Rashidah Funke

    Published 2010
    “…In this paper, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Damageless digital watermarking using complex-valued artificial neural network by Olanweraju, Rashidah Funke, Ali Aburas, Abdurazzag, Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha

    Published 2010
    “…In this paper, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network by Khalifa, Othman Omran, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2015
    “…In this study, a distortion-free digital watermarking scheme based on Complex-Valued Neural Network (CVNN) in transform domain is proposed. Fast Fourier Transform (FFT) was used to obtain the complex number (real and imaginary part) of the host image. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…This paper proposes an intelligent algorithm using an adaptive neural- Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article