Search Results - (( based information based algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A review on the graphical user authentication algorithm : recognition-based and recall-based. by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2013
    “…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
    Get full text
    Get full text
    Article
  8. 8

    An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias by Alias, Nur Farehah

    Published 2017
    “…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  10. 10

    MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data by Hongwu, Qin, Ma, Xiuqin, Herawan, Tutut, Jasni, Mohamad Zain

    Published 2014
    “…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim by Lorpunmanee, Siriluck, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan

    Published 2008
    “…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An adaptive density-based method for clustering evolving data streams / Amineh Amini by Amini, Amineh

    Published 2014
    “…This study proposes a density-based algorithm for clustering evolving data streams. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA) by Hasni, Hassan, Aznida Hayati, Zakaria@Mohamad, Mohd Isa, Awang, Mokhairi, Makhtar, Rohana, Ismail, Fadhilah, Ahmad

    Published 2017
    “…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Channel quality information (CQI) reporting algorithms in LTE-A by Ahamad Sukor, Masturah, Mohd. Ramli, Huda Adibah

    Published 2016
    “…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A buffer-based online clustering for evolving data stream by Islam, Md. Kamrul, Ahmed, Md. Manjur, Kamal Z., Zamli

    Published 2019
    “…In this study, we present a fully online density-based clustering algorithm called buffer-based online clustering for evolving data stream (BOCEDS). …”
    Get full text
    Get full text
    Get full text
    Article