Search Results - (( visualization implementation some algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…The current thesis is concerned with how biological systems solve the computational problem of visual pose estimation. Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Ray Casting for Iso-surface in Volumetric Data by Ngoc Anh, Do Hoang

    Published 2005
    “…It is opento improve for implementation on multiprocessors. The thesis will compare some existing algorithms for ray casting in terms of image quality, computing time, complexity and so forth. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Autonomous Visual Navigation using Deep Reinforcement Learning: An Overview by Ejaz, M.M., Tang, T.B., Lu, C.-K.

    Published 2019
    “…Finally, we discussed a survey of implemented algorithms of RL in the field of robotics for autonomous visual navigation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Autonomous Visual Navigation using Deep Reinforcement Learning: An Overview by Ejaz, M.M., Tang, T.B., Lu, C.-K.

    Published 2019
    “…Finally, we discussed a survey of implemented algorithms of RL in the field of robotics for autonomous visual navigation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Therefore, a progressive web-based information retrieval visualization system that utilizes Term Frequency-Inverse Document Frequency (TFIDF) algorithm and data visualization are suggested to solve these problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Comparative Study Of Blockchain Algorithms For Non-Fungible Token by Woo, Jan Yin

    Published 2023
    “…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…Nonetheless, the A • algorithm do have some unique properties which is more efficient in finding the shortest path especially in human real-world problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…After applying the denoising algorithm on the contaminated image, the cycling spinning algorithm is applied to increase the visual quality of the restored image. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking by Ong, Chor Keat

    Published 2017
    “…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    Anomaly detection for vision-based inspection by Chew, Yan Zhe

    Published 2022
    “…This study aims to implement visual inspection systems using both approaches and determine the suitability of each approach for visual anomaly detection. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis