Search Results - (( visualization implementing conversion algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Contrast enhancement for colour images based on discrete wavelet transform by Mohd Zaidi, Noor Afina

    Published 2017
    “…Low contrast images demanded contrast enhancement algorithm to intensify the visual outcomes by displaying more details. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Adopting morphology method in camera based EAN-13 1D barcode recognition using Simulink: article / Siti Nor Safinaz Ozaimidi by Ozaimidi, Siti Nor Safinaz

    Published 2012
    “…This paper studies barcode recognition which implements using Simulink MATLAB 7.13. The proposed algorithms and the implementations of image are for EAN-13 barcode by using camera devices. …”
    Get full text
    Get full text
    Article
  7. 7

    Adopting morphology method in camera based EAN-13 1D barcode recognition using Simulink / Siti Nor Safinaz Ozaimidi by Ozaimidi, Siti Nor Safinaz

    Published 2012
    “…This paper studies barcode recognition which implements using Simulink MATLAB 7.13. The proposed algorithms and the implementations of image are for EAN-13 barcode by using camera devices. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Identifying the mechanism to forecast the progression of Alzheimer’s disease from mild cognitive impairment using deep learning by Hiu, Theresa Wei Xin

    Published 2022
    “…CNN models and visualization of the brain regions which contributed to the CNN prediction assist doctors in the diagnosis of MCI conversion and the discovery of new biomarkers.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    A review of machine learning in hyperspectral imaging for food safety by Mainak Das, Yeo, Wan Sieng, Agus Saptoro

    Published 2025
    “…To address these limitations, advances in non-destructive monitoring techniques with the implementation of machine learning (ML) algorithms can be alternative solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…User will be notified by receiving an email, while the report current and past track can be viewed via web based visualization interface with Google Map as base map. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The image processing algorithm includes color space conversion and motion analysis technique. …”
    Get full text
    Thesis
  17. 17

    Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment by Wong, Peng Kiong

    Published 2004
    “…This program consists of four algorithms which are conversion formulas, smooth terrain, single convex surface terrain and double convex surfaces terrain.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment by Al-Doski, Jwan M. Mohammed

    Published 2013
    “…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis