Search Results - (( processes specifications window algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…This study aims to propose a framework for processing Top-k queries in UDS, where the focus is on leveraging the efficiency of the SWM, achieved through the SWMTop-kDelta algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…EWR is a fully online clustering technique for handling high-dimensional data streams using feature ranking and sorting. This process is accomplished by calculating the entropy of specific features with respect to the time window. …”
    Article
  8. 8

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…For hardware design of thinning, parallel pipelined with Concurrent Condition Check Unit hardware architecture has been developed to enable the parallelism of the thinning algorithm. It contains modules that executed the thinning algorithm function simultaneously in hardware to speed up the process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11
  12. 12
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Proactive Traffic-Adaptive Tuning of Contention Window for Wireless Sensor Network Medium-Access Control Protocol by Pirborj, Nesae Mouzehkesh

    Published 2009
    “…We have tried to come up with a dynamic back-off algorithm for SMAC that can extract the current traffic information of the network and engage them in estimating the contention window from which the back-off time is chosen. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Noise reduction techniques in ECG signal by Muhumed, Sakarie Muse, Ibrahimy, Muhammad Ibn

    Published 2023
    “…A dataset of ECG signals with varying levels of EMG noise has been collected using the MIT-BIH dataset. An algorithm has been designed and implemented using the DA FIR filter coupled with Kaiser windowing technique to filter out the noise. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20