Search Results - (( identification implementation case algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- identification implementation »
- implementation modified »
- implementation case »
- java implementation »
- case algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…In this case, the algorithm of the DIS operator is embedded with the Marker-based Watershed segmentation as the assistance of Marker-based Watershed Segmentation is effective in extracting the individual significant edges features produced by DIS operator. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
7
-
8
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Object detection in aerial images using Convolutional Neural Network (CNN) / Wan Nur Alya Athirah Wan Roshdee
Published 2024“…A CNN model is then implemented with Adam optimizer. The model's accuracy is recorded and saved for detecting cars in aerial images, evaluated by user input to ensure accurate identification of cars and absence of cars. …”
Get full text
Get full text
Thesis -
11
-
12
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…In addition, the structural parameters of a system can be accurately estimated through the proposed system identification methods for both cases of linear and nonlinear conditions. …”
Get full text
Get full text
Get full text
Thesis -
13
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
14
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
15
Human gait recognition and classification using similarity index for various conditions
Published 2013“…Our aim is to implement the traditional gait recognition algorithm and to show the variation in gait recognition when subject is observed parallel to camera under three conditions- walking normal, carrying a bag and wearing a coat. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Human gait recognition and classification using similarity index for various conditions
Published 2013“…Our aim is to implement the traditional gait recognition algorithm and to show the variation in gait recognition when subject is observed parallel to camera under three conditions- walking normal, carrying a bag and wearing a coat. …”
Get full text
Get full text
Get full text
Article -
17
-
18
SEMANTIC ROLE LABELING (SRL) FOR THE DISAMBIGUATION OF NATURAL LANGUAGE PROCESSING (NLP) SYSTEMS IN LOW-RESOURCED LANGUAGES AS KYRGYZ LANGUAGE
Published 2024“…Which started in accordance with Chomsky's Universal grammar theory to analyze language via algorithms which were implemented according to the language syntactical structure. …”
Get full text
Get full text
Get full text
Article -
19
Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
20
Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis
