Search Results - (( write identification using algorithm ) OR ( java implementation max algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  2. 2

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…Many algorithms have been implemented to solve the grid scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis by Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
    Get full text
    Get full text
    Book Chapter
  8. 8

    A new swarm-based framework for handwritten authorship identification in forensic document analysis by Pratama, Satrya Fajri, Draman @ Muda, Azah Kamilah, Choo, Yun Huoy, Draman @ Muda, Noor Azilah

    Published 2014
    “…Its principal point is in forensics and biometric application as such the writing style can be used as bio-metric features for authenticating the identity of a writer. …”
    Get full text
    Get full text
    Book Chapter
  9. 9

    Author identification for under-resourced language Kadazandusun by Nursyahirah, Tarmizi, Suhaila, Saee, Dayang Hanani, Abang Ibrahim

    Published 2020
    “…Stylometric features are used to quantify the writing styles of the authors which includes character n-grams and word n-grams. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Study on crack detection using image processing techniques and deep learning – a survey by Saleem, Muhammad Asif, Senan, Norhalina, Ahmad, Rehan

    Published 2020
    “…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
    Get full text
    Get full text
    Article
  11. 11

    Invariants discretization for individuality representation in handwritten authorship by Draman @ Muda, Azah Kamilah, Shamsuddin, Siti Mariyam, Darus, Maslina

    Published 2008
    “…Its focal point is in forensics and biometric application as such the writing style can be used as biometric features for authenticating a writer. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…Additionally in solving ill-structured problems, people may need to use more than a heuristic or an algorithmic strategy; insight may be required. …”
    Get full text
    Get full text
    Article