Search Results - (( developing human virtualization algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- virtualization algorithm »
- implementation modified »
- human virtualization »
- java implementation »
- developing human »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…In order to overcome latency problem, this research is an attempt to suggest a new prediction algorithm based on heuristic that could be used to develop a more effective and general system for virtual training applications. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
7
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…A state-flow control algorithm is developed on the model to improve the mentioned shortfalls. …”
Get full text
Get full text
Thesis -
8
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
9
Finger triggered virtual musical instruments
Published 2013“…The developed system has the ability to switch the virtual musical instruments between piano and drum. …”
Get full text
Get full text
Get full text
Article -
10
Finger triggered virtual musical instruments
Published 2012“…The developed system has the ability to switch the virtual musical instruments between piano and drum. …”
Get full text
Get full text
Conference or Workshop Item -
11
High performance visualization of human tumor growth software
Published 2008“…The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Real-Time Stereopsis
Published 2008“…Peoples try to make computer sees as human see. Up today there are manyalgorithm developed and invented by scientist but it's long way to go. …”
Get full text
Get full text
Final Year Project -
13
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…In comparison to human performance, the algorithm's performance closely matched that of human with 94 accuracy in identifying the syntax level strategies. …”
Get full text
Get full text
Get full text
Article -
14
Tracking of dynamic arm motion estimation and interaction with fuzzy control
Published 2016“…Considerable effort has been put toward the development of intelligent and natural interfaces be- tween users and computer systems. …”
Get full text
Get full text
Article -
15
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Hereby, the Dijkstra’s algorithm is tested with the developed 3D navigation network inside the building model. …”
Get full text
Get full text
Get full text
Thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan
Published 2024“…This means that the proposed framework through this research becomes a fundamental principle in the development of a haptic-based virtual environment. The main objective of this research is to develop and present a HBVEF-framework to design a HBVE for autistic people to improve their spatial awareness and to significantly improve their interaction abilities through haptic rendering. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
General Algorithm of n-Multiple Coil Shape for Variable Links Hyper-Redundant Robotic Manipulator
Published 2011“…An algorithm is then developed to control the links of the robot along the path so that the robot will travel in such a way that each of the follower links will take place of the earlier link‘s position. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
