Search Results - (( java implementation modified algorithm ) OR ( using gray using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Another perspective in generating and using gray code word by Ahmad, Anita

    Published 2007
    “…The design of generating the code using VHDL, hardware and algorithmic implementation procedures are embodied in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A New Approach in a Gray-Level Image Contrast Enhancement by using Fuzzy Logic Technique by Hussain K., Khaleaf, Kamarul Hawari, Ghazali, Mithaq Na'ma, Raheema, Abdalla, Ahmed N.

    Published 2015
    “…In this paper, presenting a new approach to enhancing the image contrast by using fuzzy logic algorithm, so based on the fuzzy rule, we present a new membership equation, which represents the variable threshold level. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  7. 7

    Algorithmic Loan Risk Prediction Method Based on PSO-EBGWO-Catboost by Chen, Suihai, Bong, Chih How, Chiu, Po Chan

    Published 2024
    “…To a certain extent, it avoids the inefficiency of the Gray Wolf algorithm, balances the ability of local search and global development, and improves the accuracy of the model. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    An improved image steganography algorithm based on PVD by Bhuiyan, Sharif Shah Newaj, Abdul Malek, Norun, Khalifa, Othman Omran, Abdul Rahman, Farah Diyana

    Published 2018
    “…In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganography in spatial domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Malaysian license plate recognition using sobel algorithm / Mohamad Izzuddin Sofian by Sofian, Mohamad Izzuddin

    Published 2013
    “…After snapshot of car were run on the system, it will transform or invert the images into gray scale image. Typically sobel is used to find the approximate absolute gradient magnitude at each point in an input gray scale his image. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…For optimal maintenance scheduling with low cost, high reliability, and low violation, the parameter values of the PACS algorithm were tuned using the Taguchi and Gray Relational Analysis (Taguchi-GRA) method through search-based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Reliability of voxel gray values in cone beam computed tomography for preoperative implant planning assessment by Parsa, A., Ibrahim, N., Hassan, B., Motroni, A., Van der Stelt, P., Wismeijer, D.

    Published 2012
    “…The datasets from both CT systems were matched using a three-dimensional (3D) registration algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    Diabetic retinopathy detection using Gray-Level Co-Occurrence Matrix / Aliff Azfar Aris by Aris, Aliff Azfar

    Published 2022
    “…The classification was performed by using Support Vector Machine (SVM) to generate the cross-validation accuracy to determine the learning algorithm’s performance. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli by Ramli, Muhammad Harith

    Published 2017
    “…The basic feature extraction of minimum, maximum and mean of gray level values are used as the parameter to develop the prototype. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution by Salih Al-Badri, Qussay Abbas

    Published 2006
    “…The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Preliminary Study of Wood Species Classifacation System Based on Wood Knot Texture Using K-Nearest Neighbour With Optimized Features From Binary Magnetic Optimization Algorithm S... by Osman, Khairuddin, Mohamad, Syahrul Hisham, Jaafar, Hazriq Izzuan

    Published 2013
    “…The features of the wood knot images are extracted using Gray Level Co-Occurrence Matrix. Binary Magnetic Optimization Algorithm is use to optimize the feature selection process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20