Search Results - (( java implementation modified algorithm ) OR ( based aggregation based algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- based aggregation »
- aggregation based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali
Published 2015“…From the previous researcher, the aggregation algorithm based on the Probabilistic Finite State Automata (PFSA) is derived from the study of cockroach behavior. …”
Get full text
Get full text
Thesis -
3
-
4
Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali
Published 2015“…From the previous researcher, the aggregation algorithm based on the Probabilistic Finite State Automata (PFSA) is derived from the study of cockroach behavior. …”
Get full text
Get full text
Thesis -
5
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
7
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
Published 2014“…However, the selection of Radio Access Technology (RAT) for aggregation in HWN is a great challenge. This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
Get full text
Get full text
Proceeding Paper -
8
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…Then, a new proposed cost aggregation based on the Hybrid Random Aggregation (HA) was implemented that utilized modified Iterative Non-Local Guided Filter (iNLGF), Simple Linear Iterative Clustering (SLIC), Graph Segmentation (GS) and Extended Restart Random Walk (eRWR) for error reduction. …”
Get full text
Get full text
Get full text
Thesis -
9
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…However, many issues are explored in the clustered-based data aggregation and reduced data aggregation efficiency. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Enhanced local disparity map algorithm segment-side window-based cost aggregation and refinement
Published 2025“…This paper introduces a Segment-Side Window based (SSW) stereo matching algorithm that combines Truncated Absolute Difference (TAD), Gradient Magnitude (GM), and Census Transform (CT) to build a robust cost volume. …”
Get full text
Get full text
Get full text
Article -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
12
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2017“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Book Section -
13
-
14
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2016“…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
Get full text
Get full text
Thesis -
15
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
16
Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network
Published 2021“…The proposed TVWS algorithm showed average low RLF rate values than the Conventional (CONV) and Multi-Influence Factors Handover Decision Algorithms (MIF-HODA). …”
Get full text
Get full text
Conference or Workshop Item -
17
Multi-criteria handover decision for heterogeneous networks: carrier aggregation deployment scenario
Published 2020“…The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A new function of stereo matching algorithm based on hybrid convolutional neural network
Published 2022“…This paper proposes a new hybrid method between the learning-based and handcrafted methods for a stereo matching algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The proposed protocol aims to enhance authentication by generating a random value and random timestamp with a secret key. The base station node will verify the fake aggregated data when the packets are received using the generated key earlier. …”
Get full text
Get full text
Article
