Search Results - (( java implementation modified algorithm ) OR ( pattern selection sensor algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  7. 7

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim by Hamzah, Irni Hamiza, Ibrahim, Mohammad Nizam, Mohd Kasim, Linda

    Published 2006
    “…The capability of powerful personal computers and affordable and high resolution sensors (i.e.: CCD cameras, microphones and scanners) have fostered the development of pattern recognition algorithms in new application domains (i.e.: fuzzy logic, neural network and genetic algorithm). …”
    Get full text
    Get full text
    Research Reports
  9. 9

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…During the experimentation, accurate methane gas concentration measurements at landfill sites were obtained using the algorithm for autonomous flight, with the implementation of optimal quadcopter flight parameters and gas sensor mounting arrangements. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Configuration and analysis of piezoelectric-based in socket sensory system for transfemoral prosthetic Gait detection / Farahiyah Jasni by Farahiyah , Jasni

    Published 2018
    “…The methodology comprised of selecting: (a) the best piezoelectric sensor to be used in terms of the material, size and shape, (b) the method of mounting the sensors onto the socket, and (c) the placement of the sensors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Multi resident complex activity recognition in smart home: a literature review by Mohamed, Raihani, Perumal, Thinagaran, Sulaiman, Md. Nasir, Mustapha, Norwati

    Published 2017
    “…However, this type of sensors is selected due to human centric concerns, non-obtrusive, inviolate residents’ privacy and pervasive concern. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Modeling of vehicle trajectory clustering based on LCSS for traffic pattern extraction by Choong, Mei Yeen, Lorita Angeline, Chin, Renee Ka Yin, Yeo, Kiam Beng, Teo, Kenneth Tze Kin

    Published 2017
    “…These behavioural manoeuvres are useful for interpreting the indepth study of traffic pattern in a traffic network. Hence, with the advancement of the available vehicle tracking system, vehicle trajectory dataset is selected as suitable candidate input for the traffic pattern extraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A performance comparison study of pattern recognition systems for volatile organic compounds detection / Emilia Noorsal, Muhammad Khusairi Osman and Norfadzilah Mokhtar by Noorsal, Emilia, Osman, Muhammad Khusairi, Mokhtar, Norfadzilah

    Published 2007
    “…It is well known that the use of a gas sensor array and pattern recognition system offers an effective technique for the identification of volatile organic molecules because of the poor selectivity of a lot of other gas sensors. …”
    Get full text
    Get full text
    Research Reports
  15. 15
  16. 16

    Data-driven multi-fault detection in pipelines utilizing frequency response function and artificial neural networks by Hussein, Hussein A. M, Abdul Rahim, Sharafiz, Mustapha, Faizal B., Krishnan, Prajindra S., Abdul Jalil, Nawal Aswan

    Published 2025
    “…The data underwent preprocessing, including the application of principal component analysis (PCA) for feature selection. The subsequent data processing stage involved the application of an ANN algorithm for pattern recognition to analyze and classify the acquired data, identifying patterns associated with the replicated fault conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Classification of Agarwood using ANN by M. S., Najib, N. A., Mohd Ali, M. N., Mat Arip, M., Abd Jalil, M. N., Taib

    Published 2012
    “…The data analysis using Principal Component Analysis (PCA) was done to find significant input selection from 32 sensors of the E-nose and to recognize pattern variations from different number of Agarwood samples as inputs to ANN training. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Classification of agarwood using ANN / Muhammad Sharfi Najib ...[et al.] by Najib, Muhammad Sharfi, Md Ali, Nor Azah (Dr.), Mat Arip, Mohd Nasir, Jalil, Abd Majid, Taib, Mohd Nasir

    Published 2012
    “…The data analysis using Principal Component Analysis (PCA) was done to find significant input selection from 32 sensors of the E-nose and to recognize pattern variations from different number of Agarwood samples as inputs to ANN training. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article