Search Results - (( using simulation table algorithm ) OR ( java extraction method algorithm ))
Search alternatives:
- extraction method »
- simulation table »
- method algorithm »
- table algorithm »
- java extraction »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
Get full text
Get full text
Thesis -
3
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…This design presents the uses of sinusoidal pulse width modulation (SPWM) as a switching control for multilevel inverter by using CORDIC algorithm. …”
Get full text
Get full text
Student Project -
4
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
Get full text
Get full text
Monograph -
5
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…Secondly is to design a new control strategy that will provide good tracking performance of the XY table. The final objective is to validate the proposed technique through simulation using MATLAB/Simulink software and experimental work using real plant of Googoltech XY table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Simulation of identifying shortest path walkway in library by using ant colony optimization
Published 2012Get full text
Get full text
Undergraduates Project Papers -
7
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…Water table modelling based on ANNs and ANFIS technology were developed to simulate the water table fluctuations based on the relationship between the variations of rainfall, humidity, evaporation, minimum and maximum temperature and water table depth. …”
Get full text
Get full text
Thesis -
8
OPTIMIZATION OFADVANCEDENCRYPTION STANDARD (AES) IN FPGA IMPLEMENTATION USING S-BOX INTEGRATION
Published 2004“…Thus, in this project, the AES cryptograph was simulated with FPGA, by using Verilog HDL. The main objectives are the architectural and algorithmic optimizations of the AES implementation, which would in turn benefit applications that are both speed and area critical. …”
Get full text
Get full text
Final Year Project -
9
A multiobjective simulated Kalman filter optimization algorithm
Published 2018“…It is a further enhancement of a single-objective Simulated Kalman Filter (SKF) optimization algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Resource management in grid computing using enhanced ant colony optimization
Published 2010“…Simulation approach has been used to test the performance of the algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
11
Load balancing using enhanced ant algorithm in grid computing
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
An adaptive relay selection scheme for enhancing network stability in VANETs
Published 2020“…Moreover, the network scalability is enhanced by adaptively selecting most sustainable paths based on a signal strength beacon and the mobility degree of a node, which reduces significantly minimizes the size of control messages overhead as well the routing tables recalculation process. Simulation experiments using the network simulator are presented to demonstrate the effectiveness of our solution. …”
Get full text
Get full text
Get full text
Article -
14
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
17
Ant colony algorithm for job scheduling in grid computing
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic obstacle handling in multi-robot coverage
Published 2024“…It then generates a new avoidance velocity for robots, enabling them to avoid dynamic obstacles while achieving complete coverage. The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…Substitution table or S-Box is the major core of AES algorithm and it is used to provide confusion capability for AES. …”
Get full text
Get full text
Conference or Workshop Item -
20
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report
