Search Results - (( program walking methods algorithm ) OR ( java implementation modified algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…Fourthly, four standard vectors for pedestrian walking behaviour are developed. Fifthly, the performance of the proposed classification methods is validated and evaluated against multiple scenarios and features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…The experimental study found that the three-step planning method for biped robotic static walking planning is feasible and can reach 98%, and can meet the pre-planning requirements.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Automated pavement imaging program (APIP) for pavement cracks classification and quantification – a photogrammetric approach by Mustaffar, Mushairry, Puan, O. C., Ling, Tung Chai

    Published 2008
    “…The digital image processing program enables longitudinal, transverse, and alligator cracking to be classified. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Evaluation of cracks and disintegrations using close-range digital photogrammetry and image processing technique by Ling, Tung Chai

    Published 2005
    “…Results obtained by this technique are compared with the Jabatan Kerja Raya manual using conventional method to check accuracy. The algorithms developed in this study are capable of identifying type of cracking and its severity level at the accuracy about 90%. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11

    OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People by Hairuman, Intan Fariza, Foong, Oi-Mean

    Published 2012
    “…To leverage on previous research of Signage Recognition Framework which could only recognize public signage with slanted angle less than , an improved OCR signage recognition model with skew and slant correction in public signage is presented. The proposed OCR method consists of Canny edge detection algorithm, Hough Transformation and Shearing Transformation were used to detect and correct skewed and slanted images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People by Hairuman, Intan Fariza Bt, Foong, Oi Mean

    Published 2011
    “…To leverage on previous research of Signage Recognition Framework which could only recognize public signage with slanted angle less than , an improved OCR signage recognition model with skew and slant correction in public signage is presented. The proposed OCR method consists of Canny edge detection algorithm, Hough Transformation and Shearing Transformation were used to detect and correct skewed and slanted images. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The study of transgene intergration hotspots in mammalia expression system by Shamsuddin, Shaharum

    Published 2015
    “…DNA sequences in the genome flanking the integrated vector in the high producing cells were subsequently retrieved using ‘genome walkingmethod. Following this, the flanking regions were sequenced and characterized using bioinformatics tools. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis