Search Results - (( java implementation modified algorithm ) OR ( using visual force algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Improved abnormal detection using self-adaptive social force model for visual surveillance by Wan Nur Azhani, W. Samsudin

    Published 2017
    “…In this work, we aim to find the significant interaction forces and detect the abnormality in the crowd by using Self-Adaptive Social Force Model. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Evaluation of Real-Time Visio-Haptic Deformable Bovine Rectal Palpation Simulator by Ahmad, Irshad, Sulaiman, Suziah

    Published 2010
    “…In this work, two simulators were used, one with visual deformation and other without visual deformation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  9. 9

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…Indirectly, such scheme adds extra protection to the visual scheme against brute-force search on the visual secret key.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…Parallel algorithm is used by Parallel Virtual Machine (PVM) software tool to capture the visualization of the overall extension and the stress distribution in a linearly tapered bar of circular section with an end load. …”
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…The data acquired from force sensors during walking condition is transferred to the host computer powered by LabVIEW software for visualization and analysis. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…Parallel algorithm is used by Parallel Virtual Machine (PVM) software tool to capture the visualization of the overall extension and the stress distribution in a linearly tapered bar of circular section with an end load. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    SENSORY EXPERT: DEVICE FOR SENSORY TEST by MOHD ADZMI, MOHD DANIAL AIMAN

    Published 2018
    “…In developing the algorithm for heat sensing, humidity and temperature sensor DHT 11 is used and the data of temperature is displayed in Blynk applications. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Physically-Based Animation in Performing Accuracy Bouncing Simulation by Loh, Ngiik Hoon

    Published 2020
    “…Animation based physics algorithm provided the animator the ability to control the realism of animation without setting the key frame manually, to provide an extra layer of visually convincing simulation.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Digital closed loop controller of hydraulic cylinder using linear transducer / Mohd. Aizuddin Khalid by Khalid, Mohd. Aizuddin

    Published 2010
    “…Hydraulic cylinder produces linear motion and force by using pressurized hydraulic fluid. Hydraulic cylinders are able to work at a very high force with a relatively small supply of highly pressurized fluid. …”
    Get full text
    Get full text
    Thesis