Search Results - (( through implementing software algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The developed software agent is utilized to implement prioritized token access subject to the traffic type. …”
    Get full text
    Get full text
    Article
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Computation Enhancement using Reconfigurable Computing by Salim Gumaa, Ayman Hassan

    Published 2015
    “…The objective of this project is the test of the potential this approach has for increasing computers performance through comparing a software implementation of an algorithm with an FPGA assisted implementation of the same algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE by SUN, LEE KUANG

    Published 2006
    “…Since filter is the important component in adaptive filtering process, the filter is designed first before adding adaptive algorithm. A Finite Impulse Response (FIR) filter is designed and the desired result of functional simulation and timing simulation is obtained through ModelSim and Integrated Software Environment (ISE) software and FPGA implementation. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Convolution coder software implementation using VIiterbiDecoding algorithm by Khalifa, Othman Omran, Al-Maznaee, Tariq, Munjid, Mahmood, Hussan, Aisha

    Published 2008
    “…This In this paper, Convolutional coder software implementation using Viterbi decoding algorithm for bitstream that has been encoded using Forward error correction is presented. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…For the implementation aspect, software-driven media processing was studied. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of direction of arrival (DOA) for linear array antenna design using multiple signal classification (MUSIC) algorithm in variation of displacement vectors and... by Hamzah, Norhayati

    Published 2007
    “…In Smart Antenna system, the intelligence of the system depends on the information collected, processed and implemented through an algorithm i.e. Multiple Signal Classification (MUSIC). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Comparison between RSA hardware and software implementation for WSNs sexcurity schemes by Md. Tap, Abu Osman, Manttoro, Teddy, Alkalbani, Abdullah Said

    Published 2010
    “…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The proposed algorithm is able to improve the weaknesses in PQF model in updating and learning the important attributes for software quality assessment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Verilog design of a 256-bit AES crypto processor core by Lai, Yit Pin

    Published 2007
    “…AES algorithm is fast and easy to be implemented in both software and hardware; however software implementation is vulnerable due to loopholes in operating system and generally is less efficient than hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Thesis