Search Results - (( java implementation modified algorithm ) OR ( using program walking algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement by Loo, Shing Yan

    Published 2013
    “…In the conditions of fixed walking cycle, preset walking pattern and limited torque generation in actuators, genetic algorithm is adopted to optimize the walking distance of the robot by varying the masses of torso, upper limb and lower limb, ranging from 0.01kg to 5kg. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Classification of gait parameters in stroke with peripheral neuropathy (PN) by using k-Nearest Neighbors (kNN) algorithm / N. Anang ...[et al.] by Anang, N., Jailani, R., Mustafah, N., Manaf, H.

    Published 2018
    “…This paper presents the gait pattern classification between 3 groups which are control, stroke only and stroke with Peripheral Neuropathy (SPN) using k-Nearest Neighbors (kNN) algorithm. Control group has been used as a reference or baseline in order to see the difference in the gait pattern. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…In the methodology, this study discloses five useful stages. Firstly, mobile phone users' irregular walking behaviour is investigated using a questionnaire to determine their options on mobile usage in the street. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…In the methodology, this study discloses five useful stages. Firstly, mobile phone users' irregular walking behaviour is investigated using a questionnaire to determine their options on mobile usage in the street. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…In this paper, the BIOLOID robot assembly kit is used as the research platform. Based on this, the biped robot kinematics equations and dynamic equations are deduced, and a three-step programming method is used to carry out reasonable gait planning for the biped robot. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The findings also indicate that the proposed embedded system for indoor guidance parking using Dijkstra-ACO algorithm with the proposed layout of parking bay for indoor parking system, will help in reducing the time wasted in searching for a parking bay and will increase the efficiency of the parking system in shopping malls.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Obstacle avoidance legged robot by Mohamed Faizan, Basheer Ahmad

    Published 2008
    “…A PIC Microcontroller has been implemented to act as a brain for the robot that controls the walking and turning algorithm. Ultrasonic sensor was also developed to act as an ‘eye’ to the system and tells the brain about existence of obstacle in front. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People by Hairuman, Intan Fariza, Foong, Oi-Mean

    Published 2012
    “…The proposed OCR method consists of Canny edge detection algorithm, Hough Transformation and Shearing Transformation were used to detect and correct skewed and slanted images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People by Hairuman, Intan Fariza Bt, Foong, Oi Mean

    Published 2011
    “…The proposed OCR method consists of Canny edge detection algorithm, Hough Transformation and Shearing Transformation were used to detect and correct skewed and slanted images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Automated pavement imaging program (APIP) for pavement cracks classification and quantification – a photogrammetric approach by Mustaffar, Mushairry, Puan, O. C., Ling, Tung Chai

    Published 2008
    “…Subsequently, the program will automatically estimate the crack intensity which can be used for rating pavement distress severity. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Subsequently, the program will automatically estimate the crack intensity which can be used for rating pavement distress severity. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of Hexapod Robot with Manoeuvrable Wheel by mohd zamzuri, abdul rashid, Mohd Aras, Mohd Shahrieel, Anuar , Mohamed Kassim, Annisa , Jamali

    Published 2012
    “…The decisions for the robot to use either wheel or legs are based on the sensory devices and algorithm develops at the controller attached to the robot.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article