Search Results - (( java implementation modified algorithm ) OR ( program recognition from algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…There are three main programs work together. The programs are back-propagation neural network program, training and performance program and recognition program. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…This thesis provided a detailed method in implementing the algorithm for face and person recognition by using haar cascade classifier feature detection and contour approximation. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Simulation on Emotion Recognition for Autism Therapy by Adzmi, Muhammad Azrin

    Published 2017
    “…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    3D hand posture recognition using multicam by Mohd Nazrin , Muhammad, Nurdiana, Nordin

    Published 2011
    “…The availability of the distance data allows the hand posture to be recognized in z-axis direction without complex computational algorithms which also enables the program to work in real-time processing as well as eliminates the background effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…Face is one of the unique features of human body which has complicated characteristic.Facial features (eyes, nose, and mouth) can be used for face recognition. Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…Face is one of the unique features of human body which has complicated characteristic.Facial features (eyes, nose, and mouth) can be used for face recognition. Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17
  18. 18

    An improved Malaysian automatic license plate recognition (M-ALPR) system using hybrid fuzzy in C++ environment by Thanin, Khairunnisa, Mashohor, Syamsiah, Al Faqheri, Wisam Salah

    Published 2009
    “…First, the algorithm to recognize the license plates is presented, by taking advantage of Matlab and C++ programming language benefits in order to increase system efficiency. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…Several untrained samples of numerical handwritten data were obtained at random from various people to be tested with the program. …”
    Get full text
    Get full text
    Final Year Project
  20. 20