Search Results - (( given equalization based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- equalization »
-
1
Modified HOS based Eigenvector algorithm for improvement of poor SNR of Seismic data
Published 2007“…Convolutional noise makes it difficult to identify the closely spaced bedding. Proposed blind equalization technique is based on the eigenvector algorithm [17], certain modifications are incorporated to reduce the MMSE, max. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A new split based searching for exact pattern matching for natural texts
Published 2018Get full text
Get full text
Article -
3
Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh
Published 2016“…In this thesis, the comparison of proposed algorithm namely the Exponential Blind Equal Throughput (EXP-BET) was made with the Exponential Proportional Fairness (EXP-PF) and Frame Level Scheduler (FLS) algorithms. …”
Get full text
Get full text
Thesis -
4
Bat algorithm for rough set attribute reduction
Published 2023“…In this paper, a new optimization method has been introduced called bat algorithm for attribute reduction (BAAR), the proposed method is based mainly on the echolocation behavior of bats. …”
Article -
5
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
6
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
Published 2020“…In this algorithm, the Boolean function given with coefficients, n is equal to ten (10) and its degree, d is equal to six (6). …”
Get full text
Get full text
Get full text
Article -
7
A COMPUTATIONAL ALGORITHM for the NUMERICAL SOLUTION of NONLINEAR FRACTIONAL INTEGRAL EQUATIONS
Published 2022“…With the help of the mentioned technique, the considered problem is transformed to a system of algebraic equations which is then solved for the required results by using Broyden algorithm. To check the validation and convergence of the proposed technique, some examples are given. …”
Get full text
Get full text
Article -
8
-
9
An Algorithm for Automatically Updating a Forsyth-Edwards Notation String without an Array Board Representation
Published 2023Conference Paper -
10
Cost effective Expa-Max-Min scientific workflow allocation and load balancing strategy in cloud computing
Published 2018“…Scheduling multiple workflows with the standard Max-Min algorithm is a challenge because of the high priority given to task with maximum execution time first. …”
Get full text
Get full text
Get full text
Article -
11
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
12
Face recognition based automated student attendance system
Published 2018“…The facial images are then classified and recognized based on the best result obtained from the combination of algorithm, enhanced LBP and PCA. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Comparative evaluation of anomaly-based controller area network IDS
Published 2023“…Entropy and frequency-based CAN IDS were found to be relatively better at detecting attacks, particularly fabrication attacks; while other algorithms did not perform well, as indicated by low MCC scores.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Predicting credit risk of the small medium enterprises using modified KMV model / Shakila Saad
Published 2022“…This study proposes a credit scoring method based on MCDM algorithm that will be able to forecast the score of the potential borrowers at a certain time by using the historic information. …”
Get full text
Get full text
Thesis -
17
Efficient mobile video transmission based on a joint coding scheme
Published 2017“…The simulation results are then compared with an equal error protection (EEP) scheme.…”
Get full text
Get full text
Get full text
Article -
18
Metaheuristic algorithms for solving lot-sizing and scheduling problems in single and multi-plant environments / Maryam Mohammadi
Published 2015“…Metaheuristic approaches namely genetic algorithm, particle swarm optimization, artificial bee colony, simulated annealing, and imperialist competitive algorithm are adopted for the optimization procedures. …”
Get full text
Get full text
Thesis -
19
A modified weighted support vector machine (WSVM) to reduce noise data in classification problem
Published 2021“…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A modified weighted support vector machine (WSVM) to reduce noise data in classification problem
Published 2021“…To overcome SVM drawback for noise data problem, WSVM using KPCM algorithm was used but WSVM using kernel-based learning algorithm such as KPCM algorithm suffer from training complexity, expensive computation time and storage memory when noise data contaminate training data. …”
Get full text
Get full text
Get full text
Get full text
Thesis
