Search Results - (( java implementation using algorithm ) OR ( using svd based algorithm ))

Refine Results
  1. 1

    SVD-gorank: Recommender system algorithm using SVD and gower's ranking by Saifudin, Ilham, Widiyaningtyas, Triyanna, Zaeni, Ilham Ari Elbaith, Aminuddin, Afrig

    Published 2025
    “…Therefore, this research proposes a new collaborative filtering-based algorithm that combines the matrix factorisation method using SVD and the ranking method by utilising Gower's Coefficient similarity weight as an aggregation component known as the SVD-GoRank method. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    SVD-based signal detector for cognitive radio networks by Omar, Mohd. Hasbullah, Hassan, Suhaidi, Amphawan, Angela, Awang Nor, Shahrudin

    Published 2011
    “…This paper examines the implementation of the Singular Value Decomposition (SVD) method to detect the presence of wireless signal.The method is used to find the maximum and minimum eigenvalues.We simulated the algorithm using common digital signal in wireless communication namely rectangular pulse shape, raised cosine and root-raised cosine to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in sensing signal without knowing the properties of the transmitted signal.The execution time is acceptable compared to the favorable energy detection.The computational complexity of SVD-based detector is medium compared to the energy detector.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Artificial Bee Colony-based satellite image contrast and brightness enhancement technique using DWT-SVD by Bhandari, A.K., Soni, V., Kumar, A., Singh, G.K.

    Published 2014
    “…The proposed technique is based on the Artificial Bee Colony (ABC) algorithm using Discrete Wavelet Transform and Singular Value Decomposition (DWT-SVD). …”
    Get full text
    Get full text
    Article
  5. 5

    Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain by Makbol, Nasrin M., Bee, Ee Khoo, Rassem, Taha H.

    Published 2018
    “…All types of SVD-based embedding algorithms that leads to false positive problem and the related potential attacks has been evaluated using the reliability test as well as all solutions to false positive problem are reviewed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Optimized Image Watermarking Based On HD And SVD In IWT Domain by Ahmad Hisyam, Suryanto Sugian

    Published 2022
    “…In this research, we propose an optimized image watermarking method based on Hessenberg Decomposition (HD) and Singular Value Decomposition (SVD) in the Integer Wavelet Transform (IWT) domain. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Signal detection algorithm for cognitive radio using singular value decomposition by Omar, Mohd Hasbullah, Hassan, Suhaidi, Amphawan, Angela, Awang Nor, Shahrudin

    Published 2011
    “…This paper highlights an algorithm for detecting the presence of wireless signal using the Singular Value Decomposition (SVD) technique.We simulated the algorithm to detect common digital signals in wireless communication to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in detecting a signal without knowing the properties of the transmitted signal.The performance of the algorithm is better compared to the favorable energy detection.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown.This is also the advantage of the algorithm since any signal would interfere and subsequently affect the quality of service (QoS) of the IEEE 802.22 connection.Furthermore, the algorithm performed better in the low signalto-noise ratio (SNR) environment.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Eigenvalue-based signal detectors performance comparison by Omar, Mohd Hasbullah, Hassan, Suhaidi, Awang Nor, Shahrudin

    Published 2011
    “…Two eigenvalue techniques were studied, which are the eigenvalue decomposition (EVD) and singular value decomposition (SVD) Both techniques were implemented on Matlab as detection algorithms.Using Monte Carlo simulations, we tested the algorithms to compare their performance. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  17. 17

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. …”
    Get full text
    Thesis
  18. 18
  19. 19

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system by Al-Hadi, Ismail Ahmed Al-Qasem, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Mustapha, Norwati

    Published 2016
    “…The latent feedback of the users and items are also SVD factors. The results using the EDC approach are more accurate than collaborative filtering and existing methods of matrix factorization namely SVD, baseline, matrix factorization and neighbours-base. …”
    Get full text
    Get full text
    Get full text
    Article