Search Results - (( based method pertaining algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An analysis of low complexity of 5G-MIMO communication system based CR using hybrid filter detection by Algriree, Waleed, Sulaiman, Nasri, Isa, Maryam, Sahbudin, Ratna K. Z., Hassan, Siti L. M., Hmood Salman, Emad, Alghrairi, Mokhalad

    Published 2022
    “…This recommended SS algorithm, based on the hybrid filter detection (HFD) method, employs the Cosine law for filtering the traffic signal, and then enables segmentation by applying the Welch algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net by Muslim, Norliana

    Published 2022
    “…In this study, the proposed DBL and DBLADD algorithm using the Karatsuba method for non-supersingular Koblitz curve over m bits binary field with gcd(2m– 1, 3)=1 that incorporates eight blocks of EN with three temporary variables saved two multiplications or 9.09% in DBL and DBLADD algorithms, in comparison to the recent literature pertaining to EN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    MOTION TARGET TRACKING OF MOBILE ROBOTS by NOOR RASHID, NOOR AIMAN

    Published 2015
    “…The main hardware and has been tested with basic programs based on the algorithms of the said methods. Two-dimensional coordinate measurement and calibration has been achieved with varying degrees of accuracy depending upon the resolution selected for use on the camera. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines by Tahan, M., Muhammad, M., Abdul Karim, Z.A.

    Published 2017
    “…When a robust mathematical model of a process equipment is available, model-based diagnostic methods can be used to identify the occurrence of faults in a system. …”
    Get full text
    Get full text
    Article
  13. 13

    Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods by Chin, Ying Teh, Tay, Kai Meng, Chee, Peng Lim

    Published 2017
    “…Our analysis shows that even with multi-attribute monotone data, non-monotone fuzzy If- Then rules can be produced using an ad hoc method. The same observation can be made, empirically, using a system identification method, e.g., a derivative–based optimization method and the genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Protein secondary structure prediction from amino acid sequences using a neural network classifier based on the Dempster-Shafer theory by Vel Arjunan, Satya Nanda

    Published 2003
    “…In order to reduce the computational demand when training with large data of proteins, an interface was developed using the data parallel approach to parallelize the training phase of the classifier and other accompanying methods such as data clustering algorithms. The parallelized classifier also permitted rigorous experiments to be conducted in two other benchmark problems with disparate dimensions to determine the classifier's inherent attributes and drawbacks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Design and Simulation on Compressor Metal Matrix Composite by Investment Casting by Taufik, Roni Sahroni, Tajul Ariffin, Abdullah, Sivarao, Subramonian

    Published 2011
    “…This study presents the use of genetic algorithm (GA) and computer programs for designing a new compressor and determined the wax pattern dimensions based on three-dimensional finite-element simulations as a preliminary study by using investment casting method. …”
    Get full text
    Get full text
    Article
  16. 16

    Penggunaan penyepadanan imej berdasarkan kawasan dalam fotogrametri jarak dekat bagi pengukuran permukaan struktur by Sahdan, Ahmad Yusof

    Published 2006
    “…In civil engineering, web deformations of a structure, in particular steel, are useful indicators pertaining to its failure. Present laboratory methods employed in determining the web deformations are through the use of LVDT. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Quantitative spasticity assessment model of neurological disorder patients / AA Puzi … [et al.] by Ahmad Puzi, Asmarani, Aliff-Imran, M.D., Zainuddin, Ahmad Anwar, Basri, Atikah Balqis, Mohd Khairuddin, Ismail

    Published 2023
    “…Patients with neurological disorders usually experience conditions where their muscles are stiff, tight, and prone to resist upon stretching, which in essence defines muscle spasticity. The current method of muscle spasticity assessment is based on subjective assessment by therapists who rely on their inner intuition, experience, and skills that comply with the Modified Ashworth Scale tool. …”
    Get full text
    Get full text
    Book Section
  18. 18
  19. 19
  20. 20

    Ageing oil well integrity assessment and rehabilitation / Ramesh Ramasamy by Ramesh , Ramasamy

    Published 2018
    “…The use of probabilistic methods on structural reliability is also proposed using the first-order method and computer-based Monte-Carlo and Bootstrap algorithms to address the uncertainties associated with the ageing wells. …”
    Get full text
    Get full text
    Get full text
    Thesis