Search Results - (( java implementation modified algorithm ) OR ( pattern sensing using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- pattern sensing »
- using algorithm »
- sensing using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…The purpose of this research is to develop a tilt sensing device based on moiré fringe pattern theory for landslide monitoring using Raspberry Pi. …”
Get full text
Get full text
Monograph -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…These parameters are: the flight speed at 1m/s; the altitude at 100cm-150cm; sensing at the front of the quadcopters direction of travel; maintaining a level trajectory and sensing using a straight-line pattern. …”
Get full text
Get full text
Thesis -
5
-
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Assessing rainfall prediction models: Exploring the advantages of machine learning and remote sensing approaches
Published 2024“…Deep learning uses neural networks to learn complex data patterns and relationships. …”
Review -
10
Geomorphometric analysis of landform pattern using topographic position and ASTER GDEM
Published 2017“…Maximum Elevation Deviation was selected to measure the spatial landscape pattern at the maximum (3000) scale of the absolute DEV value within the scale (DEVmax), and finally, high-pass filter algorithm was used to identify the extreme topography (ridges/valleys). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
12
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
13
Application of remote sensing instruments in air quality monitoring in Malaysia
Published 2017“…The use of remote sensing in detecting aerosol or air pollution is not widely applied in Malaysia. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
Get full text
Get full text
Get full text
Citation Index Journal -
16
-
17
Ontology enrichment with causation relations
Published 2014“…The proposed framework extracts initial semantic patterns for causation relation from the input samples, then filters these patterns using two novel algorithms, namely, the “Purpose Based Word Sense Disambiguation” which helps in determining the causation senses for input pair of words and the “Graph Based Semantics” which determines the existence of the causation relations in the sentence and to extract their cause-effect parts. …”
Get full text
Get full text
Get full text
Article -
18
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…This study focuses on using Python for remote sensing data analysis to identify and classify healthy crops. …”
Get full text
Get full text
Student Project -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Integrated multichannel Young’s interferometer sensor based on long-range surface plasmon waveguides
Published 2019“…The diverging output beams from the waveguides are overlapped in the far field to form interference patterns which are then post-processed using the fast Fourier transform (FFT) algorithm to extract phase values. …”
Get full text
Get full text
Article
