Search Results - (( java implementation modified algorithm ) OR ( using partial tree algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- tree algorithm »
- partial tree »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Partial Binary Tree Network (Pbtn): A New Dynamic Element Matching (Dem) Approach To Current Steering Digital Analog Converter (Dac)
Published 2014“…In this research, a new DEM algorithm is proposed on Current-Steering DACs with Partial Binary Tree Network (PBTN) algorithm to overcome glitches transitions with low complexity. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Current Steering Digital Analog Converter (DAC) Using Partial Binary Tree Network (PBTN)
Published 2018“…Previous research is able to increase the boundaries of Partial Binary Tree Network (PBTN) to 8-Bits. In this research, DEM algorithm is used, known as Partial Binary Tree Network (PBTN) that been proposed from previous research that aims to push the boundaries of past research from 8-bits to 10-bits. …”
Get full text
Get full text
Monograph -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Analysis & design low power multiplier using TSMC 0.18µm CMOS technology
Published 2008“…Low power multipliers are developed through minimizing switching activities of partial product using the radix 4 booth algorithm. …”
Get full text
Learning Object -
9
Pattern Recognition for Human Diseases Classification in Spectral Analysis
Published 2022“…On the other hand, classification methods are techniques or algorithms used to group samples into a predetermined category. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
A corrosion prediction model for oil and gas pipeline using CMARPGA
Published 2016“…This proposed prediction model named CMARGA is then enhanced by using genetic algorithm in order build an optimum decision tree. …”
Get full text
Get full text
Conference or Workshop Item -
11
Indoor occupancy detection using machine learning and environmental sensors / Akindele Segun Afolabi ... [et al.]
Published 2025“…In this paper, three algorithms were developed: the first was for outlier removal from features, the second was for feature selection, and the third was for partial-features-availability-aware ML model selection. …”
Get full text
Get full text
Get full text
Article -
12
The impact of fuzzy discretization�s output on classification accuracy of random forest classifier
Published 2020“…Random Forest is known as among the widely used classification algorithms by researchers and machine learning enthusiast in solving classification problems. …”
Get full text
Get full text
Article -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Color recognition wearable device using machine learning for visually impaired person
Published 2018“…The user can also hear the name of the color along with ‘feeling’ the vibration. Two algorithms were used to distinguish between colors; RGB to HSV color conversion in comparison with neural network and decision tree based machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Near-infrared spectroscopy modeling of combustion characteristics in chip and ground biomass from fast-growing trees and agricultural residue
Published 2024“…The investigation is conducted through direct combustion in an air environment using a thermogravimetric analyzer (TGA). Additionally, partial least squares regression (PLSR)-based models were developed to assess combustion performance indices via near-infrared spectroscopy (NIRS), serving as a non-destructive alternative method. …”
Get full text
Get full text
Get full text
Article -
16
An adaptive architecture for strategic Enhancement of energy yield in shading sensitive Building-Applied Photovoltaic systems under Real-Time environments
Published 2025“…However, the BAPV array encounters a significant challenge of partial shading by nearby trees or buildings that substantially reduce the generation efficiency. …”
Article -
17
The performance effect due to varying network topologies on a software-defined network employing the k-shortest path
Published 2022“…SDN controller uses the Dijkstra algorithm to find the shortest path calculated from the source node to the destination node. …”
Get full text
Get full text
Article -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
A study on component-based technology for development of complex bioinformatics software
Published 2004“…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
Get full text
Get full text
Monograph -
20
Algorithm optimization and low cost bit-serial architecture design for integer-pixel and sub-pixel motion estimation in H.264/AVC / Mohammad Reza Hosseiny Fatemi
Published 2012“…The first design has a two-dimensional (2-D) structure featured with broadcasting of reference pixel data and propagating of partial sum and SAD results. The second design uses a 2-D bit-serial adder tree connected to a reconfigurable reference buffer making it suitable for hardware parallelism. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
