Search Results - (( java implementation modified algorithm ) OR ( coding shape based algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- coding shape »
- shape based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…This study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code and Vertex chain code algorithm as picture description language, and a new computational algorithm and neural network classifier for corner detection. …”
Get full text
Get full text
Monograph -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
A biological inspired fuzzy adaptive window median filter (FAWMF) for enhancing DNA signal processing
Published 2017“…The algorithm applied to variety of DNA datasets produced noteworthy discrimination between coding and non-coding regions contrary to fixed window length conventional filters. © 2017 Elsevier B.V.…”
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…The interpreted G-codes of random-curvy-shape, oval-shape, and circular-shape trajectories were validated experimentally on an XY milling machine positioning table resulted in RMSE values of respectively 0.0203mm and 0.0068mm, 0.0063mm and 0.0064mm, and 0.0057mm and 0.0064mm for x and y axes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Augmented feedforward and feedback control of a twin rotor system using real-coded MOGA
Published 2010“…A hybrid control approach comprising a feedforward intelligent command shaping technique inverse-model based PID feedback control is presented in this paper. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Compacted dither pattern codes over MPEG-7 dominant colour descriptor in video visual depiction
Published 2010“…The results show that CDPC with Bhattacharyya classifier provides a good generalised performance for irregular shapes-based visual description as compared to the other experimental setups.…”
Get full text
Get full text
Article -
11
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…The fast search for ME techniques have their own shapes or patterns to work with in order to produce the best matching algorithm. …”
Get full text
Get full text
Thesis -
12
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006“…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
Get full text
Get full text
Thesis -
13
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
Get full text
Get full text
Thesis -
14
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Within each part, the code will sample a color, and will draw a rectangle based on sound volume level at the time the sample was taken; the louder, the taller the rectangle will be drawn. …”
Get full text
Get full text
Book Section -
15
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Most of the existing plant identification methods are based on both the global shape features and the intact plant leaves. …”
Get full text
Get full text
Thesis -
16
-
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
A region-based Principal Component Analysis (PCA) technique for medical image compression
Published 2022“…While PCA is inherently limited by its matrix form, the Arbitrary ROI coding (ARC) proposed in this work models the ROI by means of a factorization approach and the arbitrary-shaped ROI contours and NROI are compressed using BTRPCA. …”
Get full text
Get full text
Get full text
Thesis -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Statistical Approach for Image Retrieval
Published 2007“…This persistent trend has demanded a more sophisticated search algorithm on these images. One of the popular and common approaches for image search is Content-based Image Retrieval or CBIR for short, i.e. retrieval of images based on their visual contents such as shapes, colours, textures etc. …”
Get full text
Get full text
Thesis
