Search Results - (( developing shape based algorithm ) OR ( java evaluation using algorithm ))
Search alternatives:
- developing shape »
- evaluation using »
- java evaluation »
- using algorithm »
- shape based »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
2
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
3
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
4
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
5
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
6
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…The algorithm was developed based on three theories of personality traits, namely Myers-Briggs Type Indicator (MBTI), Shape, and Multiple Intelligence (MI). …”
Get full text
Get full text
Get full text
Thesis -
7
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…This proved the developed navigation algorithm not only satisfied its objective but also has reliability in its performance.…”
Get full text
Get full text
Thesis -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
9
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
10
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Article -
11
Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB
Published 2010“…In this paper, we propose a road sign detection and recognition algorithm for an embedded application. The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
Get full text
Get full text
Conference or Workshop Item -
12
Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah
Published 2015“…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
Get full text
Get full text
Thesis -
13
General Algorithm of n-Multiple Coil Shape for Variable Links Hyper-Redundant Robotic Manipulator
Published 2011“…The coil shape produced from a new inverse kinematics solution is based on Virtual Layer Approach. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
-
15
-
16
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
17
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The local stiffness indicator (LSI) was developed by Ismail and Abdul Razak (2006) and based on the fourth derivative of the mode shape. …”
Get full text
Get full text
Article -
18
Investigation And Development Of Flattening Algorithms For Curved Latent Fingerprint Images
Published 2015“…Algorithm that applies ellipse approximation provides better performance as compared with the algorithm that developed based on parabolic approximation. …”
Get full text
Get full text
Thesis -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
