Search Results - (( processes specification window algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…This study aims to propose a framework for processing Top-k queries in UDS, where the focus is on leveraging the efficiency of the SWM, achieved through the SWMTop-kDelta algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…EWR is a fully online clustering technique for handling high-dimensional data streams using feature ranking and sorting. This process is accomplished by calculating the entropy of specific features with respect to the time window. …”
    Article
  4. 4

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…For hardware design of thinning, parallel pipelined with Concurrent Condition Check Unit hardware architecture has been developed to enable the parallelism of the thinning algorithm. It contains modules that executed the thinning algorithm function simultaneously in hardware to speed up the process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…We have tried to come up with a dynamic back-off algorithm for SMAC that can extract the current traffic information of the network and engage them in estimating the contention window from which the back-off time is chosen. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Noise reduction techniques in ECG signal by Muhumed, Sakarie Muse, Ibrahimy, Muhammad Ibn

    Published 2023
    “…A dataset of ECG signals with varying levels of EMG noise has been collected using the MIT-BIH dataset. An algorithm has been designed and implemented using the DA FIR filter coupled with Kaiser windowing technique to filter out the noise. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  11. 11

    Texture-based of Naja Kaouthia snake recognition using K-Nearest Neighbour (KNN) / Nurul Hafeeza Aswani Aziz by Aziz, Nurul Hafeeza Aswani

    Published 2017
    “…A total of 20 images have been captured at Taman Rama dan Reptilia, Malacca and each images produced 10 data of extraction. In the processing phase, mean variance moving window was used for the extraction process. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…The existing cache replacement (i.e. least recently used (LRU)) algorithm depends on usage of the data being referenced. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A new method of correcting uneven illumination problem in fundus images by Aibinu, Abiodun Musa, Iqbal, Muhammad Imran, Nilsson, Mikael, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…A new method of compensating uneven (irregular) illumination in fundus images termed global-local adaptive histogram equalization using partially-overlapped windows (GLAPOW) is proposed in this paper. The developed algorithm has been tested and the results obtained show superior performance when compared to other known techniques for uneven illumination correction.…”
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Exploration of educational building with cultural elements using shape grammar by Sebastian, Heng Junjie

    Published 2013
    “…Shape grammars are used for developing computational algorithms in production systems that generate geometric shapes. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Monitoring cathodic protection system for underground pipeline by Thai, Seng Choong

    Published 2013
    “…A local server running on windows platform was used to capture and display the readings on graph. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Context enrichment framework for sentiment analysis in handling word ambiguity resolution by Yusof, Nor Nadiah

    Published 2024
    “…However, ambiguous words pose a challenge for sentiment analysis algorithms as they require the identification of the correct meaning and word polarity within a specific context. …”
    Get full text
    Get full text
    Thesis