Search Results - (( basic complete _ algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Butterfly Triple System Algorithm Based on Graph Theory by Ibrahim, Haslinda, Aldiabat, Raja’i, Karim, Sharmila

    Published 2022
    “…Basically, in this algorithm development, a starter of cyclic near-resolvable ((v-1)/2)-cycle system of the 2-fold complete graph 2Kvis employed to construct the starter of cyclic ((v-1)/2)-star decomposition of 2Kv. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A preemptive utility accrual scheduling algorithm in adaptive real time system. by Ahmad, Idawaty, Subramaniam, Shamala, Othman, Mohamed, Othman, Muhammad Fauzan

    Published 2008
    “…We consider the scheduling objective of maximizing the utility that is accrued by the completion of all tasks. Simulation results revealed that the proposed algorithm outperforms GUS algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman by Abdul Rahman, Nur Amiera

    Published 2014
    “…The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Comparison of path planning in simulated robot by Ch’ng, Chee Yu’ng

    Published 2020
    “…There are 4 path planning algorithms will be compared, which are Dijkstra’s algorithm, A* algorithm, RapidExploring Random Tree (RRT) algorithm, and the last one is an algorithm modified from A*. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17

    Power line faults classification by neural network train by Ant Colony Optimization by Nasirudin, Mohd Syafiq

    Published 2017
    “…The execution of this Ant Colony Optimization (ACO) usage was contrasted and that nonpartisan system and discovered it is more compelling than neural system. Metaheuristic algorithms are algorithms which, in order to escape from local optima, drive some basic heuristic: either a constructive heuristic starting from a null solution and adding elements to build a good complete one, or a local search heuristic starting from a complete solution and iteratively modifying some of its elements in order to achieve a better one. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Fast clock tree generation using exact zero skew clock routing algorithm by Reaz, Mamun Ibn, Ibrahimy, Muhammad Ibn, Amin, Nowshad

    Published 2009
    “…The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems by Paniandi, Arul

    Published 2006
    “…The designed RSA coprocessor core is actually a modular exponentiation hardware engine, which is the basic arithmetic operation in implementing a RSA public key encryption and decryption algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cycle time minimization in production line using robust hybrid optimization algorithm by Noorazliza, Sulaiman, Zetty Ain, Kamaruzzaman, Junita, Mohamad Saleh, Ahmad Afif, Ahmarofi

    Published 2021
    “…Bio-inspired algorithms that have been introduced by mimicking the biological phenomenon of nature have widely implemented to cater various real-world problems. …”
    Get full text
    Get full text
    Conference or Workshop Item