Search Results - (( java implementation modified algorithm ) OR ( programming usage detection algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- programming usage »
- usage detection »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…However, every single tool has different ways of detection and accuracy of the detection. This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
Get full text
Get full text
Get full text
Article -
9
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
10
-
11
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
12
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
Get full text
Thesis -
13
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…Next, the KF programming algorithm managed to diminish the measurement noise including the Main bang and flaw echo of the ultrasonic sensor. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
REAL TIME ABNORMAL SOUND DETECTION AND CLASSIFICATION FOR HOME ENVIRONMENT
Published 2011“…Gaussian Mixture Model (GMM) technique is suitable for usage in Matlab software. Signals from sensor will be detected and MFCC will extract the features which meet the requirement decided. …”
Get full text
Get full text
Final Year Project -
17
Communication module for urban vehicle two-way connection monitoring device / Ahmad Kamil Mohamad Yunus
Published 2015“…When these conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
Get full text
Get full text
Thesis -
18
Communication module for urban vehicle two-way connection monitoring device: article / Ahmad Kamil Mohamad Yunus
Published 2015“…When certain conditions are detected, the monitoring unit will be programmed to send out notifications to the fleet monitoring system. …”
Get full text
Get full text
Article -
19
Traffic congestion detection for smart and control transportation management
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Leaf condition analysis using convolutional neural network and vision transformer
Published 2024“…Besides, existing leaf disease detection programs do not provide an optimized user’s experience. …”
Get full text
Get full text
Get full text
Article
