Search Results - (( java application means algorithm ) OR ( changes evaluation based algorithm ))
Search alternatives:
- application means »
- java application »
- evaluation based »
- means algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
4
-
5
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
6
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
8
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…Performance evaluation involves injecting a voltage disturbance into the buck converter with load changes of up to 20%. …”
Get full text
Get full text
Get full text
Article -
11
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
12
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
Get full text
Get full text
Get full text
Thesis -
14
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2018“…Therefore, this research focuses on identifying objective measurements based on dentists’ subjective evaluation on abnormalities in jaw area. …”
Get full text
Get full text
Book Section -
15
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
Get full text
Get full text
Thesis -
16
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…Steady state operation and three critical dynamic operations, which involve change of nonlinear loads, off-on operation between PV and SAPF, and change of irradiances, were carried out for performance evaluation. …”
Get full text
Get full text
Article -
17
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2017“…Therefore, this research focuses on identifying objective measurements based on dentists' subjective evaluation on abnormalities in jaw area. …”
Get full text
Get full text
Thesis -
18
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
19
New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions
Published 2022“…The proposed Trapezoidal rule based P&O algorithm is evaluated under three conditions: (1) under uniform irradiance (2) under shading conditions and (3) under sudden and step changes in irradiation levels as well as the transition between shading patterns. …”
Get full text
Get full text
Article -
20
Evaluation of genetic algorithm based solar tracking system for photovoltaic panels
Published 2008Get full text
Get full text
Conference or Workshop Item
