Search Results - (( java implementation modified algorithm ) OR ( key detection using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- key detection »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…Asymmetric key algorithm is also known as public-key cryptography, is a class of cryptographic algorithms with require two separate keys, one is secret (private) key and another one is public key. …”
Get full text
Get full text
Thesis -
6
An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization
Published 2019“…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
Get full text
Get full text
Article -
7
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article -
8
Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys
Published 2016“…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
Improving intrusion detection using genetic algorithm
Published 2013“…Intrusion Detection System (IDS) is one of the key security components in today’s networking environment. …”
Get full text
Get full text
Get full text
Article -
10
A novel algorithm to detect a QPSK signal with the minimum number of samples
Published 2015“…The algorithm was simulated and tested using ANSI C++. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree
Published 2018“…It can automatically simplify the region of interest with unique key-points matching. Harris Laplace corner detection has been used to find accurate matching key points for different photometric changes, scaling in images. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Cabbage disease detection system using k-NN algorithm
Published 2022“…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Landmark detection for vision based of autonomous guided vehicle
Published 2012“…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…Two datasets (compact disc database (CDDB) and MusicBrainz) were used to test duplicates detection algorithms. The duplicates detection toolkit(DuDe) was used as a benchmark for the proposed method. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
Get full text
Get full text
Thesis -
16
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…Multivariate Statistical Process Control (MSPC) uses historical data of processes to develop useful process fault detection, diagnosis and control tools. …”
Get full text
Get full text
Monograph -
18
Road triangle detection for non-road area elimination using lane detection and image multiplication
Published 2017“…The background has become the key issue in maintaining the accuracy of final analysis for object detection in the development of an image processing algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Development of cellular neural network algorithm for detecting lung cancer symptoms
Published 2012Get full text
Working Paper -
20
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…Conflict is detected and avoided using the route occupation time of each segment. …”
Get full text
Get full text
Get full text
Article
