Search Results - (( java implementation modified algorithm ) OR ( using ((care using) OR (code using)) algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- care using »
- code using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006“…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
Get full text
Get full text
Monograph -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS
Published 2010“…There has been growing interests in using optical code division multiple access (OCDMA) systems for the next generation high-speed optical fiber networks. …”
Get full text
Get full text
Thesis -
8
Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity
Published 2018“…The proposed algorithm integrates the use of compression, multiplexing, and multilayer techniques in encoding and decoding the QR code. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
Get full text
Get full text
Thesis -
10
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…Besides that by using LDPC code the decoding processing time can be reduced. …”
Get full text
Get full text
Get full text
Thesis -
11
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
12
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
13
Fast multilayer color QR code decoder algorithm utilizing fuzzy technique
Published 2020“…The algorithm starts with the detection of the color QR code. …”
Get full text
Get full text
Get full text
Article -
14
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Monograph -
15
Algorithm analyzer to check the efficiency of codes
Published 2011“…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. …”
Get full text
Get full text
Conference or Workshop Item -
16
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced algorithms for three-dimensional object interpreter
Published 2004“…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
Get full text
Get full text
Get full text
Thesis -
18
Optimality of bus-invert coding
Published 2009“…We also show that partitioning an M-bit bus into P subbuses and using bus-invert coding on each subbus can be described as applying the Viterbi algorithm on a 2P-state trellis.…”
Get full text
Get full text
Article -
19
A new corner detection algorithm for chain code representation.
Published 2005“…Computational phases to derive values of rows and columns given a series of chain code are also given in detail. The algorithm can be used to interpret line drawing that represents three-dimensional object. …”
Get full text
Get full text
Article -
20
PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES
Published 2008“…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
Get full text
Get full text
Final Year Project
