Search Results - (( data operation using algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…The enhanced XTS mode of operation is implemented using OpenMP (Open specifications for Multi Processing) by careful use of parallelism strategy to divide encrypted data evenly among the available processors. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Solving economic load dispatch problem using genetic algorithm method / Norliza Kamarulzaman by Kamarulzaman, Norliza

    Published 2009
    “…In this study, Genetic Algorithm method is used to overcome this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…Secure Socket Layer (SSL) is one of the most widely used security protocols on the Internet. In the current Bulk Data Transfer (BDT) phase in SSL, the server or the client firstly calculates the Message Authentication Code (MAC) of the data using HMAC operation, and then performs the symmetric encryption on the data together with the MAC. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…In the current bulk data transfer phase in Secure Socket Layer (SSL), the server or the client firstly calculates the Message Authentication Code (MAC) of the data using Keyed-Hash Message Authentication Code (HMAC) operation, and then performs the symmetric encryption on the data together with the MAC. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…In the current bulk data transfer phase in Secure Socket Layer (SSL), the server or the client firstly calculates the Message Authentication Code (MAC) of the data using HMAC operation, and then performs the symmetric encryption on the data together with the MAC. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    BASE: a bacteria foraging algorithm for cell formation with sequence data by Nouri, Hossein, Tang, Sai Hong, Baharudin, B. T. Hang Tuah, Mohd Ariffin, Mohd Khairol Anuar

    Published 2010
    “…The performance of the proposed algorithm is compared with that of a number of algorithms that are most commonly used and reported in the corresponding scientific literature, such as the CASE clustering algorithm for sequence data, the ACCORD bicriterion clustering algorithm and modified ART1, and using a defined performance measure known as group technology efficiency and bond efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Vehicle routing problem with pick-up and delivery using genetic algorithm / Muhammad Shahfiq Zazali and Wan Muhamad Nasrin Aiman Mat Soti by Zazali, Muhammad Shahfiq, Mat Soti, Wan Muhamad Nasrin Aiman

    Published 2022
    “…The most optimal solution for the data used is 233641.009 calculated using a software that uses the Ruin and Recreate principle. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The AADS algorithm uses evolving methods which are evolving autonomous data partitioning (eADP) and non-weighted frequency equations. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Optimizing the latency of the 4G network by using Routing Algorithm / Rossidah Wan Abdul Aziz ... [et al.] by Wan Abdul Aziz, Rossidah

    Published 2022
    “…This research objective is to determine minimum network latency using a Routing Algorithm in 4G network and to classify which 4G network operators arethe best by using Routing Algorithm. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
    Get full text
    Get full text
    Article
  20. 20

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…In these simulations, AES is used as encryption algorithm with 256-bit encryption key.…”
    Get full text
    Get full text
    Conference or Workshop Item