Search Results - (( basic evaluation using algorithmic ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- basic evaluation »
- evaluation using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Routing performance enhancement in hierarchical torus network by link-selection algorithm
Published 2005“…We evaluate the dynamic communication performance of an HTN using dimension-order routing and link-selection algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
6
Dynamic communication performance enhancement in hierarchical torus network by selection algorithm
Published 2012“…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
7
Adaptive routing algorithms and implementation for TESH network
Published 2013“…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article -
8
Butterfly traffic pattern in selection algorithm on hierarchical torus network
Published 2015“…In this paper, we have evaluated the dynamic communication performances of an HTN is evaluated by using dimension-order routing and LS+CS algorithm under butterfly traffic pattern. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
High performance hierarchical torus network under matrix transpose traffic patterns
Published 2004“…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
13
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Book Chapter -
14
Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation
Published 2014“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Get full text
Book Chapter -
15
The non-uniform communication performance of adaptive routing for hierarchical interconnection network for 3D VLSI
Published 2015“…this paper, we have evaluated the dynamic performance of a TESH network using different non uniform traffic patterns. …”
Get full text
Get full text
Get full text
Article -
16
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
17
High performance hierarchical torus network
Published 2012“…The static network performances are derived from the graph model and the DCP is evaluated by using dimension-order routing and newly proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Proceeding Paper -
18
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project -
19
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
20
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
Get full text
Get full text
Get full text
Article
