Search Results - (( identification implementation path algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam by Samam, Felix Ceilomond

    Published 2015
    “…Route planning using Dijkstra's algorithm can produce better accuracy and more reliable in indoor environment since the only factor taken into account is the weight for each path.…”
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Exploratory Study on Navigation System for Visually Impaired Person by Anuar , Mohamed Kassim, Shukor, Ahmad Zaki

    Published 2013
    “…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
    Get full text
    Get full text
    Article
  9. 9

    Performance Study of Developed SMART EYE for Visually Impaired Person. by Anuar , Mohamed Kassim, Shukor, Ahmad Zaki

    Published 2013
    “…Path planning algorithm will be implemented in this project to give the shortest path and direction as a navigation guide for visually impaired people. …”
    Get full text
    Get full text
    Article
  10. 10

    Design of self-tuning minimum effort active noise control with feedback inclusion architecture by Raja Ahmad, Raja Mohd Kamil, Tokhi, Mohammad Osman

    Published 2009
    “…This switch is closed and opened in sequence generating two transfer functions which are then used in constructing the controller specified by a minimum effort control law. The implementation requires an estimate of the secondary path transfer function which can be identified either online or offline. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…GA is an optimization algorithm that simulates natural selection process as found in nature. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…Lastly, a single-agent variant of SKF and a multi-objective SKF were introduced. SKF algorithms and its variants have been implemented in at least nine areas of applications: drill path optimization, airport gate allocation problem (AGAP), assembly sequence planning (ASP), system identification, feature selection, image template matching, controller tuning, wireless sensor network, and engineering design problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…In everyday experiences, these steps may be implemented very flexibly, such that various steps may be repeated, may occur out of sequence, or may be implemented interactively. …”
    Get full text
    Get full text
    Article
  16. 16

    Embedded Dual Band Rfid Based Blood Glucose Monitoring System For Internet Of Medical Things by Hamid, Shabinar Abdul

    Published 2020
    “…To optimize the arrangement of routers for real implementation of the developed system in health facilities, the developed path loss model estimates that the router should be positioned at a distance of 30 m from each other, which agrees with the test results which indicate that the router should be positioned ≤ 40 m in order to achieve the best PDR performance.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Intruder localization wireless sensor network radar design with virtual reference tags by Abdullah, Hadi

    Published 2014
    “…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis