Search Results - (( java implementation modified algorithm ) OR ( program detection device algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- program detection »
- device algorithm »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.]
Published 2013Get full text
Get full text
Research Reports -
4
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
5
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Subjects:Article -
6
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
7
Charge-coupled device based on optical tomography system for monitoring two-phase flow
Published 2024Article -
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
9
-
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus
Published 2015“…When these conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
Get full text
Get full text
Thesis -
13
INTERFACING CMOS CAMERA WITH ARM MICROCONTROLLER FOR SMALL ROBOTIC PLATFORM
Published 2013“…The robot follows the object according to the algorithm that had been programmed. The heart of the system is Raspberry Pi. …”
Get full text
Get full text
Final Year Project -
14
Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus
Published 2015“…When certain conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
Get full text
Get full text
Article -
15
Sensor module for urban vehicle two way connection monitoring system/ Muhammad Ilyasaa Abdul Rahman
Published 2015“…The project framework is divided into 2 main parts: living thing and impact detection. The sensing module will be interfaced with a microcontroller platform programmed with a set of algorithm. …”
Get full text
Get full text
Student Project -
16
Portable people counting application using MATLAB
Published 2023“…By using Viola-Jones algorithm as the base, a face detection program to count people can be build. …”
text -
17
Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment
Published 2017“…Due to the memory size increase drastically in the field programable gate array (FPGA) or system on chip (SOC) device, it become hard to meet the tests cost budget of the product especial for low-cost device. …”
Get full text
Get full text
Thesis -
18
-
19
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…In recent years, several Android malware applications were developed to perform certain illegitimate activities and harmful actions on mobile devices. In response, specific tools and anti-virus programs used conventional signature-based methods in order to detect such Android malware applications. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Obstacles Avoidance Mobile Robot
Published 2007“…The algorithm simply works by driving the robot forward until it detects an obstacle; once it does, it backs up, turns away and resumes moving forward. …”
Get full text
Get full text
Final Year Project
