Search Results - (( java implementation tree algorithm ) OR ( programmes using software algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    FPGA based Twofish Algorithm by Muhammad Imran, Ahmad, Mohd Nazrin, Md Isa, Abdul Halis, Abdul Aziz, Mohd Fisol, Osman

    Published 2009
    “…The input for this design is taken from the flash memory which is embedded in Altera UP3 trainer board and the output is transferred to computer by using serial interface. The algorithm is compiled and simulated using Altera Quartus II software. …”
    Get full text
    Working Paper
  8. 8
  9. 9

    Literature Survey On Stereo Vision Disparity Map Algorithms by Rostam Affendi, Hamzah, Haidi, Ibrahim

    Published 2016
    “…The survey also notes the implementation of previous software-based and hardware-based algorithms. Generally, the main processing module for a software-based implementation uses only a central processing unit. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hardware And Software Partitioning Using Genetic Algorithm In Image Processing Application by Loo, Fang Hean

    Published 2018
    “…The framework for HW-SW Partitioning using Genetic Algorithm (GA) is developed in MATLAB. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…The hardware based of encryption chip become realizable with Field Programmable Gate Arrays (FPGAs). There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…One of the techniques has recently used was Software Prefetching. Software prefetching relies on the programmer or compiler to insert explicit prefetch instructions into the application code for memory references that are likely to miss in the cache. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Fiber-Wireless testbed using software defined radio for protocol and algorithm testing by Ridwan M.A., Mohamed Radzi N.A., Abdullah F.

    Published 2023
    “…Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
    Article
  15. 15
  16. 16

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…The main aim of this research is to compute the discrete eigenvalues and visualize the eigenfunctions for the modular group, commutator subgroup and principal congruence subgroup of level two in a parallel computing environment using GridMathematica software. Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design and development of a programmable painting robot for houses and buildings by Aris, I., Parvez Iqbal, A. K. M., Ramli, A. R., Shamsuddin, S.

    “…The System Is Divided Into Two Main Parts Namely Hardware And Software. In Hardware Part, Mechanical Design, Fabrication, Electrical And Electronics System Are Described And In Software Part, Control Algorithm Is Explained. …”
    Get full text
    Get full text
    Article
  18. 18

    Design and development of a programmable painting robot for houses and buildings by Aris, A. K. M., Iqbal, Parvez, Ramli, A. R., Shamsuddin, S

    Published 2005
    “…The system is divided into two main parts namely hardware and software. In hardware part, mechanical design, fabrication, electrical and electronics system are described and in software part, control algorithm is explained. …”
    Get full text
    Get full text
    Article
  19. 19

    OPTIMAL DATAPATH DESIGN FOR A CRYPTOGRAPHIC PROCESSOR: THE BLOWFISH ALGORITHM by Zain Ali, Noohul Basheer, Noras, James

    Published 2001
    “…BLOWFISH is a fast cryptographic software algorithm, using the operations of addition, XOR and look-up tables. …”
    Get full text
    Get full text
    Article
  20. 20

    Develpoment of combinatorial optimisation for cutting tool path strategy by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2009
    “…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
    Get full text
    Get full text
    Conference or Workshop Item