Search Results - (( developing effective even algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- effective even »
- even algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
Get full text
Get full text
Monograph -
8
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…Even though there are many improvements have been made to the Porter Algorithm, we will focus on the original algorithm in this project. …”
Get full text
Get full text
Final Year Project -
9
The online mastermind game / Cheong Kuen Leion
Published 2003“…This online Mastermind game project is developed to give the chances to people from all arround the world to play with each other though the are not known each other: Besides that, this project is also to test the effectiveness of the technique, which is called as Genetic Algorithm on solving a problem. …”
Get full text
Get full text
Thesis -
10
Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots
Published 2006“…Results showed that robot controllers could be successfully developed using the POE-MOEA algorithm. The generated robot controllers allowed the robots to move towards to the light source even the simulation and testing environments are noticeably different.…”
Get full text
Get full text
Research Report -
11
Development Of A Library Navigation System Using Dijkstra’s Algorithm
Published 2024journal::journal article -
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
13
Autonomous control of tilt tri-rotor unmanned aerial vehicle
Published 2016“…A control algorithm of tri-rotor aircraft using PID control and the effect of it in a tilt tri-rotor aircraft is proposed and observed in this paper.In the development of the control algorithm, a mathematical model consisting variables from three motors used and its tilting mechanism is obtained and referred to. …”
Get full text
Get full text
Get full text
Article -
14
The design and applications of the african buffalo algorithm for general optimization problems
Published 2017“…There have been several scientific investigations in the past several decades on discovering effective and efficient algorithms to providing solutions to the optimization needs of mankind leading to the development of deterministic algorithms that provide exact solutions to optimization problems. …”
Get full text
Get full text
Thesis -
15
An evaluation of network load balancing through Ant Colony Optimization (ACO) based technique / Muhammad Nur Zikri Mohamad Hafizan
Published 2020“…This project works on developing an efficient network load balancing mechanism based on the Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Student Project -
16
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…In addition, to evaluate the effect of using the AIMD algorithm after its development to measure the efficiency and fairness and find new enhancement results for our approach, which named as the New-AIMD algorithm. …”
Get full text
Get full text
Get full text
Article -
17
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…This algorithm developed to allow user to receive push notification effectively based on the location of user’s smartphone that can be detected by Bluetooth Smart Ready Technology (BLE). …”
Get full text
Get full text
Thesis -
19
The algorithm design for trust in peer-to-peer bitcoin transactions on blockchain/ Irni Eliana Khairuddin
Published 2021“…Hence, these are the primary motivation of this study, to design the algorithm for trust in peer-to-peer transaction. The design work was conducted by using a physical blockchain kit, namely BlocKit with 15 Bitcoin Blockchain experienced to explore the opportunity to develop the algorithm.…”
Get full text
Get full text
Get full text
Article -
20
Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer
Published 2016“…The treatment plans were then recalculated using Pencil Beam algorithm and similar TCP, NTCP and isotoxic effects were evaluated. …”
Get full text
Get full text
Monograph
