Search Results - (( basic communication based algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    A hybrid range-free algorithm using dynamic communication range for wireless sensor networks by Fengrong, Han, Izzeldin Ibrahim, Mohamed Abdelaziz, Xinni, Liu, Kamarul Hawari, Ghazali, Hao, Wang

    Published 2020
    “…Firstly, we applied statistical methods to analyze the relationship between location error and hop count under different communication ranges. Thereafter, we employed centroid algorithm to calculate target node coordinate based on hop threshold. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient transmission based on genetic evolutionary algorithm by Jin Fan, Kit Guan Lim, Helen Sin Ee Chuo, Min Keng Tan, Ali Farzamnia, Kenneth Tze Kin Teo

    Published 2022
    “…In this paper, an energy-saving mechanism based on genetic algorithm in wireless sensor network (WSN) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  8. 8
  9. 9
  10. 10

    Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication by Yasir, Javed

    Published 2020
    “…It is one of the key approaches that has revolutionized communication and is the basis of the 5G network. D2D allows small devices such as mobile phones, tablets to act as Non-transparent relays (NTR) where they can provide services as well as forward traffic, request or services besides basic function that is direct communication without the need of Base Station (BS). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Research on the construction of English intelligent classroom based on Artificial Intelligence by Wu, Yong, Othman, Abdul Jalil, Saad, Mohd Rashid Mohd

    Published 2018
    “…Due to the uncertainty of emotions, traditional machine learning algorithms may not handle this uncertain inference problem well while probability theory provides us with the basic foundation to model the uncertainty of emotions. …”
    Get full text
    Get full text
    Article
  15. 15

    Ant system with heuristics for capacitated vehicle routing problem by Tan, Wen Fang

    Published 2013
    “…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Trust‑based lightweight security protocol for device to device multihop cellular communication (TLwS) by Adnan Shahid, Khan, Yasir, Javed, Johari, Abdullah, Kartinah, Zen

    Published 2021
    “…Besides basic function that is direct communication without the need of Base Station (BS), D2D allows small communicating device to act as intermediate device not only for forward the trafcs but also permits the sharing of resources such as spectrum, services, data and social contents for any users that are near the proximity range. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The design and applications of the african buffalo algorithm for general optimization problems by Odili, Julius Beneoluchi

    Published 2017
    “…Based on the successful experimentation with the novel algorithm, it is safe to conclude that the ABO is a worthy contribution to the scientific literature.…”
    Get full text
    Get full text
    Thesis