Search Results - (( basic detection device algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…With development of mobile computing devices and wireless technique, location detection system is used to determine users location either in indoor or outdoor environment that relies on WiFi signal strength. …”
    Get full text
    Student Project
  10. 10

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…The increasing number of mobile devices using the Android operating system in the market makes these devices the first target for malicious applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Development of automated neighborhood pattern sensitive fault syndrome generator for SRAM by Rusli, Julie Roslita, Mohd Sidek, Roslina, Wan Hasan, Wan Zuha

    Published 2012
    “…With the increasing complexity of memory devices, fault diagnosis is becoming as important as fault detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Speed detection of moving vehicle using normal camera by Nur Adila , Mamat

    Published 2012
    “…With a typical video camera and normal computer, a speed detection device can be created. By using basic scientific velocity theory, the speed of moving vehicle in the video can be calculated from the known distance and time, which the vehicle has moved beyond.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Tracking and counting motion for monitoring food intake based on depth sensor by Kassim, Muhammad Fuad

    Published 2020
    “…Previous studies have shown that most of the methods used to count food intake device is worn device type. The recent trend is now going towards non-wearable devices due to the difficulty when wearing devices and it has high false alarm ratio. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Development of high speed booth multiplier with optimized stuck-at fault implementation by Mohammed Khalid, Muhammad Nazir, Wan Hasan, Wan Zuha, Sulaiman, Nasri, Wagiran, Rahman

    Published 2002
    “…Multiplier is a basic device in many digital systems such as signal processor, calculator and micro controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…However, the existing spectra of biometric devices in real world application are contact-based devices and are mostly unimodal systems. …”
    Get full text
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article