Search Results - (( identification implementation path algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- identification implementation »
- implementation modified »
- implementation path »
- java implementation »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
An improved narrowband active noise control system without secondary path modelling based on the time domain
Published 2019“…There are several available ANC algorithms that do not require secondary path estimation for modifying the FxLMS algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…Route planning using Dijkstra's algorithm can produce better accuracy and more reliable in indoor environment since the only factor taken into account is the weight for each path.…”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
-
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Exploratory Study on Navigation System for Visually Impaired Person
Published 2013“…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
Get full text
Get full text
Article -
9
Performance Study of Developed SMART EYE for Visually Impaired Person.
Published 2013“…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
Get full text
Get full text
Article -
10
Design of self-tuning minimum effort active noise control with feedback inclusion architecture
Published 2009“…This switch is closed and opened in sequence generating two transfer functions which are then used in constructing the controller specified by a minimum effort control law. The implementation requires an estimate of the secondary path transfer function which can be identified either online or offline. …”
Get full text
Get full text
Get full text
Article -
11
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
Get full text
Get full text
Thesis -
12
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…GA is an optimization algorithm that simulates natural selection process as found in nature. …”
Get full text
Get full text
Thesis -
13
Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem
Published 2022“…Lastly, a single-agent variant of SKF and a multi-objective SKF were introduced. SKF algorithms and its variants have been implemented in at least nine areas of applications: drill path optimization, airport gate allocation problem (AGAP), assembly sequence planning (ASP), system identification, feature selection, image template matching, controller tuning, wireless sensor network, and engineering design problem. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Problem Solving
Published 2010“…In everyday experiences, these steps may be implemented very flexibly, such that various steps may be repeated, may occur out of sequence, or may be implemented interactively. …”
Get full text
Get full text
Article -
16
Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things
Published 2020“…To optimize the arrangement of routers for real implementation of the developed system in health facilities, the developed path loss model estimates that the router should be positioned at a distance of 30 m from each other, which agrees with the test results which indicate that the router should be positioned ≤ 40 m in order to achieve the best PDR performance.…”
Get full text
Get full text
Thesis -
17
-
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
