Search Results - (( java implementation new algorithm ) OR ( using code ((max algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    WIMAX TESTBED by KOH , MINGHAO

    Published 2008
    “…This project also takes the first few steps of hardware implementation by using Real Time Workshop to convert the Simulink model into C codes which run outside MATLAB. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Digital beamforming implementation of switch-beam smart antenna system by using integrated digital signal processor and field-programmable gate array by Vakilian, Vida

    Published 2008
    “…After modeling, the algorithm is implemented in DSP. By using the Hardware- In-Loop facility of DSP, the comparison between hardware implementation and software modeling is performed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  7. 7

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  8. 8

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    The design of viterbi decoder for low power consumption space time trellis code without adder architecture using RTL model by Abu, Mohd Azlan, Harun, Harlisya, Harmin, Mohammad Yazdi, Abdul Wahab, Noor Izzri, Abdul Kadir, Muhd Khairulzaman

    Published 2016
    “…Design/methodology/approach – The code uses a generator matrix designed for four-state space time trellis code (STTC) that uses quadrature phase shift keying (QPSK) modulation scheme. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
    Get full text
    Get full text
    Thesis
  13. 13

    FPGA Implementation of Emergency Door Car Entry System by Zaini Sulaiman

    Published 2008
    “…Altera® Quartus II is used to create the source code and download it into the FPGA board. …”
    Get full text
    Learning Object
  14. 14

    A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks by , Abdul Wahid, Khan, Adnan Umar, , Mukhtarullah, Khan, Sheroz, Shah, Jawad

    Published 2019
    “…The multilayered version of CSC(ML-CSC) is shown to be connected to forward pass of CNNs and dictionary learning and sparse coding algorithms of this model are analyzed for solving classification and inverse problems in image processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Design of an OFDM transmitter and receiver using FPGA by Loo, Kah Cheng

    Published 2004
    “…This performance of the coding is analyzed from the result of timing simulation using Altera Max Plus II…”
    Get full text
    Get full text
    Thesis