Search Results - (( java implementation modified algorithm ) OR ( using code window algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- window algorithm »
- using code »
-
1
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…The algorithm is based on 8-connected 3x3 windows of Freeman chain code. …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Line clipping based on parallelism approach and midpoint intersection
Published 2014“…The main property is considered in this algorithm is the parallelism with window boundary to define the clipped line.For parallel lines with window boundaries no need to use intersection point method to find the coordinates of the end points of the clipped line.Midpoint algorithm is used to determine the intersection point with the clipped boundary for non-parallel lines. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
PCB defect detection system using run-length encoding
Published 2017“…Both of the PCB test and PCB original images was created an analysis window. Each of the analysis windows contents the RLE code. …”
Get full text
Get full text
Student Project -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Spectrum efficiency enhancement in dynamic space coded multiple access (DSCMA) system
Published 2010“…These codes are used together with a novel algorithm called dynamic space code (DSC), which will decrease the code length so that the spectrum efficiency can be increased. …”
Get full text
Get full text
Article -
12
Development of optimum window size in tropical climate using computational fluid dynamics and experimental works
Published 2016“…Data analysis revealed that the predicted mean vote (PMV) standard equation was thermally neutral.The objective of this work is to design window sizes for tropical climates using CFD code FLUENT version 6.3 and ANSYS for geometric generation. …”
Get full text
Get full text
Thesis -
13
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…Altera® Quartus II is used to create the source code and download it into the FPGA board. …”
Get full text
Learning Object -
14
Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels
Published 2021“…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
Get full text
Get full text
Get full text
Article -
15
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005“…The hybrid technique enables us to efficiently handle wire type configurations using a MoM type of code, while we use the proposed domain decomposition FDTD method to analyze inhomogeneous structures, such as buildings with doors, windows and electronic. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
Get full text
Get full text
Thesis -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
WIMAX TESTBED
Published 2008“…This project also takes the first few steps of hardware implementation by using Real Time Workshop to convert the Simulink model into C codes which run outside MATLAB. …”
Get full text
Get full text
Final Year Project -
19
On-chip communication system modeling approach for reability analysis focusing on functional failures
Published 2012“…Using 4-PAM modulation as the signaling scheme together with three variations of Hamming block codes, the proposed on/off chip communicationsystem model is compared to AWGN model in terms of bit error ratio. …”
Get full text
Get full text
Thesis -
20
Design and Analysis of a Dynamic Space-Code Multiple Access with Large Area Synchronous Scheme Using the Smart Antenna System
Published 2007“…The size of IFW is adaptable with the size of smart antenna beamwidth through dynamic space code (DSC) algorithm. Hence, this double signatures scheme forms a novel multiple access scheme called Dynamic Space Code Multiple Access (DSCMA) system. …”
Get full text
Get full text
Thesis
