Search Results - (( java implementation real algorithm ) OR ( automatic identification rules algorithm ))
Search alternatives:
- identification rules »
- java implementation »
- implementation real »
- rules algorithm »
- real algorithm »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
3
Feature extraction using spectral centroid and mel frequency cepstral coefficient for Quranic accent automatic identification
Published 2014“…This paper presents the process of Quranic Accent Automatic Identification. Recent feature extraction technique that is used for Quranic verse rule identification/Tajweed include Mel Frequency Cepstral Coefficients (MFCC) which prone to additive noise and may reduce the classification result. …”
Get full text
Get full text
Conference or Workshop Item -
4
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…With the powerful networking features of Java applet, it is expected that this project would produce a real game engine. …”
Get full text
Get full text
Thesis -
6
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
8
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol implemented in real RFID system outperforms other related protocols because of 13.46 % shorter read time and write time consumed. …”
Get full text
Get full text
Thesis -
10
Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control
Published 2015“…Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
Get full text
Get full text
Get full text
Article -
13
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
14
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
15
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
Get full text
Get full text
Article -
16
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
18
Classroom finder system with student availability, space and time constraint
Published 2024“…The project is also aimed to implement real-time management, communication and updates of the assessment and room details to provide instant updates and notifications. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
20
