Search Results - (( data application a algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Consequently,the implementation of this technique will be applicable to enterprise application such as bank, insurance, group of companies as well as a small and medium organization such as NGO. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Development of decentralized data fusion algorithm with optimized kalman filter. by Quadri, Sayed Abulhasan

    Published 2016
    “…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Data discovery algorithm for scientific data grid environment by Abdullah, Azizol, Othman, Mohamed, Sulaiman, Md. Nasir, Ibrahim, Hamidah, Othman, Abu Talib

    Published 2005
    “…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm by Ali, M., Jung, L.T., Abdel-Aty, A.-H., Abubakar, M.Y., Elhoseny, M., Ali, I.

    Published 2020
    “…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
    Get full text
    Get full text
    Article
  16. 16

    Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm by Ali, M., Jung, L.T., Abdel-Aty, A.-H., Abubakar, M.Y., Elhoseny, M., Ali, I.

    Published 2020
    “…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
    Get full text
    Get full text
    Article
  17. 17

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…This is due to the cryptography operations that include the HMAC and symmetric encryptions. The thesis proposes a new algorithm that provides a significant performance gain in bulk data transfer without compromising the security. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm requires two inputs for it to be applied onto a data set, the value K, and a proximity measure. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman by Seman, Ali

    Published 2013
    “…Six Y-STR data sets were used as a benchmark to evaluate the performances of the algorithm against the other eight partitional clustering algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20