Search Results - (( java implementation modified algorithm ) OR ( software identification system algorithm ))
Search alternatives:
- implementation modified »
- software identification »
- identification system »
- java implementation »
- system algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…The system algorithm is verified and validates on two sloped bumps surface topographies that have been simulated using MATLAB software and measured using the Alicona Infinite Focus Measurement (IFM) device, respectively. …”
Get full text
Get full text
Thesis -
5
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Online fingerprint recognition
Published 2010“…All the systems will be built using MATLAB software…”
Get full text
Get full text
Undergraduates Project Papers -
8
Discrete-Time System Identification Based On Novel Information Criterion Using Genetic Algorithm
Published 2017“…Model structure selection is a problem in system identification which addresses selecting an adequate model i.e. a model that has a good balance between parsimony and accuracy in approximating a dynamic system. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…System identification is a process where a mathematical model is derived in order to explain dynamical behaviour of a system. …”
Get full text
Get full text
Get full text
Article -
10
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…With those improvements in accuracy and the speed, the proposed algorithm contributes to the advancement of finger vein biometric system.…”
Get full text
Get full text
Thesis -
11
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
12
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
13
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004Get full text
Get full text
Thesis -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
15
Software-Defined Radio-Based Modulation and Demodulation Scheme
Published 2009“…However, the identification ability of the system may vary from one modulation scheme to another, and from CWT to FFT; therefore, designing an identification system which combines both the techniques will be able to increase the ability for accurate identification.…”
Get full text
Get full text
Thesis -
16
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…The configuration of 132/11kV from actual distribution system in Malaysia with 38 nodes is modelled using the PSCAD/EMTDC software. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Hardware And Software Development Of ECG Biometric System
Published 2018Get full text
Get full text
Monograph -
18
Embedded system for biometric identification based on iris detection
Published 2009Get full text
Article -
19
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Rapid prototyping of such controller is developed using the available equipments and software tools. The study includes the tuning of the controller in a heuristic way and the strategy to combine two kinds of control algorithm in the control system. …”
Get full text
Get full text
Thesis -
20
Texture-based feature using multi-blocks gray level co-occurrence matrix for ethnicity identification
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item
