Search Results - (( basic detection technique algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- basic detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Distance approximation using pivot point in narrow phase collision detection
Published 2013“…Most computer games and simulation maintain speed as the main important elements while others such as medical and mechanical simulation needs to have a very high precision collision detection technique. Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…The technique utilizes the narrow phase approach in detecting collision detection of non-convex object by testing collision between basic primitive and polygon. …”
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Clustering technique basically utilizes distance measure to define distance between various data points. …”
Get full text
Get full text
Get full text
Article -
11
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Intrusion Detection (ID) in the context of computer networks is an essential technique in modern defense-in-depth security strategies. …”
Get full text
Get full text
Thesis -
12
-
13
INVESTIGATION OF CANNY TECHNIQUE FOR EDGE DETECTION IN IMAGE PROCESSING
Published 2004“…However, one problem with the basic Canny technique is that of so-called `Y junctions'.…”
Get full text
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…IC-MFDs based hand-crafted features and IC-MFDs based machine-crafted features. IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
Article -
15
Cars detection in stitched image using morphological approach
Published 2017“…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
16
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Various multi resolution techniques are used that include wavelet based spectrum estimation and spectral hole detection, wavelet based multi-resolution in analog domain and multi-resolution multiple antenna based detection. …”
Get full text
Get full text
Thesis -
17
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…This paper surveyed studies on skin cancer detection using deep learning to assess the features and advantages of other techniques. …”
Get full text
Get full text
Get full text
Article -
18
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
19
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Secondly, this report will review the literature part which started with basic knowledge of data mining and knowing what the basic information about data mining. …”
Get full text
Get full text
Thesis -
20
Performance optimization method in OFDM based on majorization and minimization technique
Published 2019“…Basically, TQM principles are based on time-domain OFDM symbols Majorization and Minimization (MM) technique. …”
Get full text
Get full text
Get full text
Article
