Search Results - (( developing affecting force algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…This braking force distribution affects vehicles stability while braking. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…The Active ankle foot orthosis (AAFO) has been developed to overcome this problem by assisting the motion of the ankle complex based on force controlled actuator. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Effect of bed vicinity on vortex shedding and force coefficients of fluid flow on an offshore pipeline by Namazi-saleh, F., Kurian, V.J., Mustaffa, Z., Tahan, M., Kim, D.

    Published 2017
    “…Evaluation of the developed numerical model shows that the proposed technique is capable of properly predicting hydrodynamic forces and simulating the flow pattern. …”
    Get full text
    Get full text
    Article
  11. 11

    A new estimation of nonlinear contact forces of railway vehicle by Khakoo Mal, Imtiaz Hussain Kalwar, Khurram Shaikh, Tayab Din Memon, Bhawani Shankar Chowdhry, Kashif Nisar, Manoj Gupta

    Published 2021
    “…However, it is hard to find the status of this adhesion force due to its complexity, highly non-linear nature, and also affected with an unpredictable operation environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improving automatic forced alignment for phoneme segmentation in Quranic recitation by Alqadasi, Ammar Mohammed Ali, Khedher, Akram M Z M, Sunar, Mohd Shahrizal, Hj Salam, Md. Sah, Abdulghafor, Rawad, Khaled, Nashwan Abdo

    Published 2024
    “…These enhancements encompass the adaptation of an acoustic model tailored for Qur’anic recitation as preprocessing and culminate in the development of an algorithm aimed at refining forced alignment based on the phonetic nuances of the Qur’an. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale by Ameenuddin Irfan, S., Fadhli, M.Z., Padmanabhan, E.

    Published 2021
    “…Wettability is the capability of a liquid to remain in contact with a solid surface affected by the balance of both intermolecular force of adhesive force (liquid to surface) and cohesive force (liquid-liquid). …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A New Cell Formation Method Considering Operation Sequences And Production Volumes by Abedini, Panteha

    Published 2013
    “…The graph theory was employed to develop the algorithm. It consists of four stages that the first one shows the sequences of machines that are used by each part in a graph. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Cash-flow analysis of a wind turbine operator by Muhamad Razali N.M., Hashim A.H.

    Published 2023
    “…The paper outlines a method to evaluate the distribution of WTG operator's daily cash-flow by developing an algorithm based on Monte-Carlo technique. …”
    Conference Paper
  19. 19

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Furthermore, the proposed KSA algorithm has been validated using the randomness test proposed and recommended by NIST, avalanche test and has achieved remarkable result of 94%, brute force and correlation assessment test with -0.000449 correlations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20