Search Results - (( developing special visualization algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- special visualization »
- java implementation »
- developing special »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Visual Public-Key Cryptosystems.
Published 2012“…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.…”
Get full text
Get full text
Monograph -
6
The Development of Color Based Visual Search Utility
Published 2001“…Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
Get full text
Get full text
Thesis -
7
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations. …”
Get full text
Get full text
Thesis -
8
The Development Of Planar Curves With High Aesthetic Value
Published 2010“…The pattern of research in this ¯eld of study has branched to ¯ve major groups; the devel- opment of fairing algorithms; the development of planar curves via curve synthesis, the development of algorithms to modify natural spirals to suit design intent, the modi¯cation of °exible curves (B¶ezier and NURBS) so that the curvature pro¯le is strictly monotonic and ¯nally, the development of algorithms to ¯t natural spirals and approximation via °exible curves.…”
Get full text
Get full text
Thesis -
9
Image storage and retrieval using color quantization method
Published 2005“…The image is segmented by our proposed segmentation algorithm, which uses the compact color descriptor .The result of the experiment shows that the developed segmentation algorithm produces better performances as compared with the existing segmentation algorithm. …”
Get full text
Get full text
Article -
10
Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution
Published 2006“…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
Get full text
Get full text
Thesis -
11
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. The latter is developed using an adapted algorithm of Hejhal and Then which is based on implicit automorphy and finite Fourier series. …”
Get full text
Get full text
Thesis -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Another feature that the CASDSS offers is visualization where the system is able to visualize the clustering results as well as the strengths and weaknesses of the ASD students. 80 data regarding the autistic student’s behaviour, intelligence and skills are collected from special schools through distribution of questionnaires. …”
Get full text
Get full text
Thesis -
14
Design And Evaluation Of A Modified Csma/Cd Mac Protocol On Single-Channel Optical Local Area Network
Published 2003“…The algorithm was developed in Visual Basic 6.0v programming language. …”
Get full text
Get full text
Thesis -
15
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…It also restricts to visualize inherent frequency of EEG for a general practitioner. …”
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
17
eVtols : smart air mobility project / Muhammad Faiz Abu Hassan
Published 2024Get full text
Get full text
Book Section -
18
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…The ongoing advancement of architectural and structural designs, high-ceiling spaces, special spaces have made fire disasters increasingly diverse and difficult to predict. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article
