Search Results - (( java implementation modified algorithm ) OR ( _ visualization toward algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. In proposed research work, the user is aided by a visualization based on the representation of multidimensional Genetic Algorithm data on 2-0 space. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…It is imperative to consider human different perspective in order to visualize the information data towards users.Many studies proved that personality traits are one of the most significant factors that must be considered to give meaningful value when us ers see a view.This study tries to give ample evidence toward adjusting visual features on tag cloud visualization techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…The current thesis is concerned with how biological systems solve the computational problem of visual pose estimation. Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Autonomous Target Tracking Of A Quadrotor UAV Using Monocular Visual-Inertial Odometry by Chin, Mun Xue

    Published 2018
    “…This project presents a simulation of UAV, in MATLAB & SIMULINK, capable of autonomously detecting and tracking a designed visual marker. Referring to and improving the state-of-the-art CV algorithms, there is a newly formulated approach to detect the designed visual marker. …”
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Jobs Visualization and Salary Prediction System Based on Jobstreet Malaysia / Khyrina Airin Fariza Abu Samah ... [et al.] by Abu Samah, Khyrina Airin Fariza, Wirakarnain, Nurqueen Sayang Dinnie, Deraman, Noor Afni, Johari, Siti Nor Amalina, Moketar, Nor Aıza, Hasrol Jono, Mohd Nor Hajar

    Published 2021
    “…Therefore, using the modified waterfall consisting of four phases and applying the linear regression and visualization techniques help overcome the problem. It does not merely offer the jobs for the graduates, but they are also provided with the aid of foreseeable salary to make it easier for them to choose based on their expectation towards the wage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Haptic Texture Search Engine Framework by Adi, Waskito, Sulaiman, Suziah

    Published 2010
    “…This leads towards obtaining a haptic texture search engine that enables cloth searching not only visually but also haptically. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    PID controller for unmanned aerial vehicle in closed environment using fiducial marker systems by Amiri, Mohammad Soleimani, Ramli, Rizauddin, Zaidi, I. E., Van, Mien

    Published 2024
    “…The aim of this paper is to develop an autonomous navigation algorithm for a UAV using a tag-based visual system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Challenges in multi-layer data security for video steganography by Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

    Published 2018
    “…To overcome these problems, the cryptography and error correction codes are comes in the pictures and hybrid with steganography algorithms. The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Eye makeup system using interactive genetic algorithm by Chua,, Suk Ju.

    Published 2010
    “…In order t o solve this problem, an eye makeup system using interactive Genetic Algorithm ( iGA) is proposed. This project focuses on the design and development of an eye makeup system using interactive Genetic Algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19
  20. 20

    A hybrid fuzzy approach of Similarity-Influence-Network and DEMATEL: visualization and analysis by Kamis, Nor Hanimah, Ahmad Shamudin, Nurul Atiqah, Kilicman, Adem, A. Kadir, Norhidayah, Yusoff, Binyamin

    Published 2024
    “…In order to address the oversight of neglecting criteria interdependent relationships, we extend the similarity-influence-network algorithm by integrating a cause-effect visualization procedure inspired by the DEMATEL approach. …”
    Get full text
    Get full text
    Get full text
    Article