Search Results - (( java implementation some algorithm ) OR ( programming data compression algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- programming data »
- data compression »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Parallelization Of CCSDS Hyperspectral Image Compression Using C++
Published 2018“…The first step of the research is converting the CCSDS-MHC algorithm into a full program in C++, with both compression and decompression features. …”
Get full text
Get full text
Monograph -
4
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…To achieve a scalable parallel speech coding algorithm, single program multiple data (SPMD) programming model was used, in which a single program was written for all cores. …”
Get full text
Get full text
Get full text
Article -
5
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Speech compression using compressive sensing on a multicore system
Published 2011“…Finally, to speed up the process, the proposed algorithm will be implemented in a multicore system, i.e. six cores, using Single Program Multiple Data (SPMD) parallel paradigm.…”
Get full text
Get full text
Proceeding Paper -
8
Predicting uniaxial compressive strength using Support Vector Machine algorithm
Published 2019“…This paper presents the application of Support Vector Machine (SVM) algorithm to predict the UCS. An algorithm has been tested on a series of rock data using dry density and velocity parameters. …”
Get full text
Get full text
Article -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
14
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
17
Artificial neural network (ANN) modeling & validation to predict compression index of tropical soft soil
Published 2010“…In current study, bore hole data was collected from JKR, Kuching to train and validate the neural network for the prediction of settlement rather than compression index (Cc). …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Compression Chemical Signal Using Wavelet Transform
Published 2009“…In this paper, we will discuss the application of Fast Wavelet Transform (FWT) for data compression in chemistry. Some numerical results will be presented by using Matlab programming.…”
Get full text
Get full text
Citation Index Journal -
19
-
20
Compression of chemical signal using wavelet transform
Published 2009“…In this paper, we will discuss the application of Fast Wavelet Transform (FWT) for data compression in chemistry. Some numerical results will be presented by using Matlab programming. …”
Get full text
Get full text
Get full text
Citation Index Journal
