Search Results - (( java implementation modified algorithm ) OR ( pattern identification method algorithm ))
Search alternatives:
- implementation modified »
- pattern identification »
- identification method »
- java implementation »
- method algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…Pattern recognition approach based on Auto-Regressive (AR) algorithm is an alternative way to provide a more accurate defect identification from stress wave propagated along ASTM A179 heat exchanger tubes. …”
Get full text
Get full text
Get full text
Article -
4
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019“…Besides, common spatial pattern (CSP) is the well-known method for classification algorithm in the BCI field. …”
Get full text
Get full text
Final Year Project -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Many improvements methods were utilized to increase the speed and accuracy of the identification. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Finger Vein Recognition Using Pattern Map As Feature Extraction
Published 2012“…Experimental results show that the proposed pattern map algorithm has better performance with a consistent identification rate of 99% and above compared to existing methods such as PCA and Gabor with FVCode. …”
Get full text
Get full text
Thesis -
9
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. …”
Get full text
Get full text
Monograph -
10
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…However, gait patterns can vary significantly between individuals, making it challenging to develop a generalized algorithm for identifying incline surface human activity. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Sistem Pengecaman Bentuk Berdasarkan FPGA
Published 2005“…Pattern recognition means that the definition, identification and the classification by deciding the characteristics of that pattern which is need to be known. …”
Get full text
Get full text
Monograph -
12
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The pattern recognition results showed that the AR algorithm is more effective in defect identification. …”
Get full text
Get full text
Get full text
Article -
13
-
14
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Sparse representation prevents over-fitting in the classifier by eliminating redundancies and evaluating high-frequency patterns between feature vectors. Performance of proposed methods surpass the classic bag of words algorithm for plant identification tasks.…”
Get full text
Get full text
Get full text
Article -
15
Personal identification by Keystroke Pattern for login security
Published 2001Get full text
Get full text
Thesis -
16
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
18
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019Get full text
Get full text
Conference or Workshop Item -
19
EEG Eye State Identification based on Statistical Feature and Common Spatial Pattern Filter
Published 2019Get full text
Get full text
Conference or Workshop Item -
20
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…This will allow the investigators to detect the data remnants and identify their patterns. The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis
