Search Results - (( basic generation _ algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- basic generation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Basic firefly algorithm for document clustering
Published 2015“…To address the shortcoming, this paper proposes a Basic Firefly (Basic FA) algorithm to cluster text documents.The algorithm employs the Average Distance to Document Centroid (ADDC) as the objective function of the search. …”
Get full text
Get full text
Conference or Workshop Item -
6
Pumped-storage scheduling using particle swarm optimization / Amirul Asraf Razali
Published 2012“…The basic PSO algorithms_is been used to determine the economic dispatch of the hydrothermal generation with pumped-storage unit. …”
Get full text
Get full text
Thesis -
7
T-way testing : a test case generator based on melody search algorithm
Published 2015“…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…One of the most operational improvements in the standard of NSA is how to generate effective detectors which play a significant role in self and non-self discrimination in intrusion detection system (IDS).In this paper, we offer an improvement to a detector generating algorithm to generate effective detectors which leads to improve the standard of NSA, which in turn leads to improve the NSA based anomaly intrusion detection.Experimental results show that the improved algorithm able to generate more effective detectors and keeping the space and time complexities better than in the standard of NSA. …”
Get full text
Get full text
Get full text
Article -
11
Fast clock tree generation using exact zero skew clock routing algorithm
Published 2009“…The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Real-time algorithmic music composition application.
Published 2022“…The developed system shall be able generated music based on a genetic algorithm, where users can define basic parameters including the instrument used to play the music, tempo, number of generated notes, and the number of measures to generate. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
Get full text
Get full text
Thesis -
14
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…This algorithm solution generated the dataset based coordinates areas to analyze the techniques. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
19
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Two versions of the Jaya algorithm namely, the basic Jaya algorithm and novel quasi-oppositional Jaya (QOJaya) algorithm are proposed to solve different single objective OPF problems. …”
Get full text
Get full text
Thesis -
20
Development of automated neighborhood pattern sensitive fault syndrome generator for SRAM
Published 2012“…A proven March algorithms are used in this generator to verify the efficiency of this generator by producing the fault coverage and diagnostic resolution. …”
Get full text
Get full text
Conference or Workshop Item
