Search Results - (( java implementation new algorithm ) OR ( using code cell algorithm ))
Search alternatives:
- java implementation »
- implementation new »
- cell algorithm »
- new algorithm »
- using code »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A new dynamic code assignment algorithm for joint CDMA and SDMA system
Published 2008“…This article describes an optimal dynamic code assignment algorithm, which can be used to maximize the total number of users in combined C-SDMA system with minimum required quality of service (QoS) and limited number of codes. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
6
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
7
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
8
The evolution and trend of chain code scheme
Published 2008“…Since it was introduced by Freeman, the development of chain code and its application increases rapidly. This paper explains some chain code concepts and their applications that are be the background of the development of vertex chain code cells algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…Genetic algorithm (GA) is then applied to form optimal beams to cover all UEs in a cell with minimum power. …”
Conference Paper -
11
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023“…Genetic algorithm is then applied to form beams with minimum power to cover all UEs in a macro cell. …”
Conference paper -
12
Multi-dimensional optimization of In0.53Ga0.47As thermophotovoltaic cell using real coded genetic algorithm
Published 2023“…The reported efficiencies of In0.53Ga0.47As TPV cell mostly remain < 15%. Therefore, this work develops a multi-variable or multi-dimensional optimization of In0.53Ga0.47As TPV cell using the real coded genetic algorithm (RCGA) at various radiation temperatures. …”
Article -
13
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
14
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation
Published 2007“…When a new user requests for a channel, the BS first checks the available signatures in terms of codes and Angle of Arrival (AoA); it then assigns the user with an already used code (used by other users) if they are spatially orthogonal to each other, otherwise an available new code will be assigned. …”
Get full text
Get full text
Thesis -
17
Development of images segmentation using image thresholder and batch processing technique on the blood smears
Published 2022“…Next, we clean up the obtained cell mask and examine cell properties using the image region analyzer function, which allows quickly filling in region holes and filtering out regions based on their properties such as area dimensions or eccentricity. …”
Get full text
Get full text
Get full text
Article -
18
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…We have investigated two performance characteristics, system sum rate and computational complexity using various linear pre-coding schemes, including the proposed one. …”
Get full text
Get full text
Thesis -
19
VLSI implementation of huffman design using FPGA with a comprehensive analysis of power restrictions
Published 2015“…The simulations are carried out by using Modelsim tool. The architecture of compression and decompression algorithm design has been created using Verilog HDL language. …”
Get full text
Get full text
Get full text
Article -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. …”
Get full text
Get full text
Get full text
Article
