Search Results - (( basic formation using algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- basic formation »
- formation using »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
6
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The problematic message uses light blue representation in simulation. The sent message uses the red color representation in the simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
11
Shepherding: An Immune-Inspired Robotics Approach
Published 2010“…The algorithm is applied on the Player/Stage simulation platform and evaluated using the sheepdog scenario. …”
Get full text
Get full text
Conference or Workshop Item -
12
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…The four basic behaviours of mobile robot are chasing, approaching, avoiding and escaping. …”
Get full text
Get full text
Thesis -
13
-
14
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
15
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
16
Automatic image annotation using color segmentation / Siti 'Aisyah Sa'dan
Published 2009“…The scope of this project is digital image of beach photographs with JPegs format. This project is implemented using a basic KMeans clustering as the algorithm for color segmentation and using direct technique to annotate the colors with the appropriate words by using predefined colors.…”
Get full text
Get full text
Thesis -
17
Geology and the control of lithology to vegetation change by using remove sensing at Takalar regency , South Sulawesi Indonesia
Published 2018“…The purpose of specification study is to determine the relationship between vegetation index algorithms using remote sensing technique and determine a location of vegetation change based on lithology using satellite imagery to produce a thematic map. …”
Get full text
Undergraduate Final Project Report -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…Then, the Apriori algorithm is used to formulate association ruleset in association analysis process and is known as the CTI Association Ruleset (CTI-AR). …”
Get full text
Get full text
Get full text
Get full text
Thesis
