Search Results - (( identification implementation level algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- identification implementation »
- implementation modified »
- implementation level »
- java implementation »
- level algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…A pooling based feature extraction technique for finger vein identification was implemented in this research. The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
-
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Analysis characteristic and performance of passive Radio Frequency Identification (RFID) for 13.56MHz system / Mohd Faizul Azmy Amat
Published 2007“…Scopes of work include the algorithm for RFID flow in which frequency band will be continually implemented considering pre-determined constraints. …”
Get full text
Get full text
Thesis -
10
Development of biosignals-based multimodal biometric system
Published 2014“…In order to reach a higher security level, an alternative multimodal and a fusion technique is implemented into the system. …”
Get full text
Get full text
Get full text
Thesis -
11
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…For the numerical identifications, three different levels of white noise variances were taken. …”
Get full text
Get full text
Thesis -
12
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…For an auto tracking device, the most crucial part of the system is the object identification and tracking of the moving targets. In order to improve the accuracy of identification of object in different illumination and background conditions, the implementation of HSI color model is used in image processing algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
Get full text
Get full text
Thesis -
16
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Cross-layer architecture of impulse-based ultra wideband to support the integration of Radio Frequency Identification and wireless sensor network infrastructures
Published 2012“…Adaptive transmission algorithm has been studied to show the trade-off flexibility between different specific quality of service requirements and transmission rate parameters at the physical-layer level in varied distance scenarios. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
Get full text
Get full text
Thesis -
19
Security system using biometric technology: Design and implementation of voice recognition system (VRS)
Published 2008“…In this paper, we present an implementation of a security system based on voice identification as the access control key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Author identification for under-resourced language Kadazandusun
Published 2020“…The workflow of Author Identification implements the machine learning approach to solve the single-labelled multi-class problem and predict the author of a given message in KadazanDusun. …”
Get full text
Get full text
Get full text
Get full text
Article
