Search Results - (( developing animation techniques algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…Each of the steps involved in the cryptanalysis is shown using animation technique developed using Macromedia Flash. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Although more development is still needed for the project, initial testing shows that local council are able to provide a more efficient service to its local neighbourhoods by using the Stray Animal Complaint System mobile application.…”
    Get full text
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9
  10. 10

    Investigating feed mix problem approaches: An overview and potential solution by Abd Rahman, Rosshairy, Chooi, Leng Ang, Ramli, Razamin

    Published 2010
    “…The proposed technique refers to Hybrid Genetic Algorithm which is expected to obtain the minimum cost diet for farmed animal, while satisfying nutritional requirements. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Swarm intelligence optimization algorithms: a review by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad

    Published 2018
    “…The primary reason for this interest is because swarm intelligence exploits the miraculous cum harmonious working of nature in ensuring order, preservation, conservation, longevity and sustenance of plants and animals in the ecosystem. As a result, researchers that believe that mimicking nature is key to solving diverse problems in engineering, technology and science has developed a number of swarm intelligence techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Nature-Inspired Heuristic Frameworks Trends in Solving Multi-objective Engineering Optimization Problems by Chang C.C.W., Ding T.J., Ee C.C.W., Han W., Paw J.K.S., Salam I., Bhuiyan M.A.S., Kuan G.S.

    Published 2025
    “…These algorithms are inspired and modelled based on the searching behaviour of animals in real life. …”
    Review
  17. 17

    Surface reconstruction using grayscale analysis / Nur Hamizah Hamid by Hamid, Nur Hamizah

    Published 2012
    “…In grayscale analysis, by using the depth(z) values from grayscale image, the shape of the 2D frontal facial image will be reconstructed. The proposed algorithm tries to overcome some shortcomings in other technique such as slow and also expansive. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to enhance the structural operational deflection shape under random ambient excitation through mode shape expansion / Muhamad Azhan Anuar by Anuar, Muhamad Azhan

    Published 2021
    “…The implementation of this study involves systematic methodology; (i) Operational Modal Analysis (OMA) as an experimental method – The experimental data were collected and processed in order to decompose the signal into modal components using different algorithms to obtain reliable experimental modal data (ii) Finite Element (FE) as numerical technique – FE model was developed, and normal modes results were obtained. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Integrating Interactive Multimedia Objects in Mobile Augmented Reality for Sarawak Tourism by Lee, Angeline, Ng, Edmund Giap Weng, Tan, Kuan Yin., Siti Shukhaila, Shaharuddin, Syaryfah Fazidawaty, Wan Busrah

    Published 2018
    “…As for interaction module, technique of color picking algorithm was applied. Henceforth, a prototype of mobile Sarawak Tourism system was developed to evaluate the multimedia based modules functionalities testing; text, animations, audio, video, 2D/3D object interactions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article