Search Results - (( recognition application optimization algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    A Systematic Review of Metaheuristic Algorithms in Human Activity Recognition : Applications, Trends, and Challenges by John Deutero, Kisoi, Norfadzlan, Yusup, Syahrul Nizam, Junaini

    Published 2025
    “…Metaheuristic algorithms have emerged as promising techniques for optimizing human activity recognition (HAR) systems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    Deep Learning Based Face Attributes Recognition by Saidi, Mohamad Hazim

    Published 2018
    “…Combined-algorithm based optimizers plays an important role in optimizing the training algorithm. …”
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Automated recognition of Ficus deltoidea using ant colony optimization technique by Ishak, Asnor Juraiza, Che Soh, Azura, Marhaban, Mohammad Hamiruce, Khamis, Shamsul, Ghasab, Mohammad Ali Jan

    Published 2013
    “…Improving in the fields of soft computing and artificial intelligence, the branch study of automated herb recognition among plenty of weeds has become challenging issue due to their applications in medicine, food and industry. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    GA Based Feature Recognition of Step File for CAD/CAM Integration by Syafnil, Alfais Admiral

    Published 2009
    “…A GA model is proposed for optimizing the coordinates which is used for feature recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The definition includes processing of an image in which handwritten letters or numbers exist with the term handwriting recognition. The practical applications of handwriting recognition in many of the current real-world applications rely on the processing of sequential texts, where the language must be detected with efficiency, suggesting the development of a flexible handwriting recognition model. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item