Search Results - (( using identification path algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- using identification »
- identification path »
- java implementation »
- path algorithm »
-
1
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2016“…This paper proposes an algorithm frame-work to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Conference or Workshop Item -
2
False path identification algorithm framework for nonseparable controller-data path circuits
Published 2017“…This paper proposes an algorithm framework to deal with these false paths through identification for DFT test. …”
Get full text
Get full text
Article -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
-
5
Optimization of drilling path using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Article -
6
Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions
Published 2020“…Dijkstra’s algorithm was one of the shortest path algorithms that would be used to identify the path with the least cost. …”
Get full text
Get full text
Get full text
Article -
7
-
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
9
Gait identification and optimisation for amphi-underwater robot by using ant colony algorithm
Published 2019“…Hence, this research presents the point-to-point gait identification or path planning of the behavious of the robot to manuever autonomously on both on-land and underwater environment. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
11
-
12
An improved narrowband active noise control system without secondary path modelling based on the time domain
Published 2019“…The acoustic noise generated is further compounded by using secondary path identification which makes the system complex. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
15
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
Get full text
Get full text
Conference or Workshop Item -
16
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. The DTW voice pattern classification module is playing a very important role as it is used to get the optimal path between the input voice and the reference voice in the database. …”
Get full text
Get full text
Conference or Workshop Item -
17
Classification Analysis Of High Frequency Stress Wave For Autonomous Detection Of Defect In Steel Tubes
Published 2014“…Interpretation of propagated high frequency stress wave signals in steel tubes is noteworthy for defect identification.This paper demonstrated a successful new approach for autonomous defect detection in steel tubes using classification analysis of high frequency stress waves.Classification analysis using Principal Component Analysis (PCA) algorithm involved feature extraction to reduce the dimensionality of the complex stress waves propagation path.Two defective tubes containing a slot defect of different orientation and a reference tube are inspected using Vibration Impact Acoustic Emission (VIAE) technique.The tubes are externally excited using impact hammer.The variation of stress wave transmission path are captured by high frequency Acoustic Emission sensor.The propagated stress waves in the steel tubes are classified using PCA algorithm.Classification results are graphically illustrated using a dendrogram that demonstrated the arrangement of the natural clusters of the stress wave signals.The inspection of steel tubes showed good recognition of defect in circumferential and longitudinal orientation.This approach successfully classified stress wave signals from VIAE testing and provide fast and accurate defect identification of defective steel tubes from non-defective tubes. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Localization using fingerprint method in emergency situation for indoor navigation system / Felix Ceilomond Samam
Published 2015“…The technique used for the route planning is Dijkstra's algorithm. …”
Get full text
Get full text
Thesis -
20
Systematic design of chemical reactors with multiple stages via multi-objective optimization approach
Published 2015“…Following the identification of path-dependent design variables, several (possibly conflicting) design objectives will be selected and solutions of the corresponding problem will be generated from multi-objective optimization algorithm. …”
Get full text
Get full text
Conference or Workshop Item
