Search Results - (( developing evaluation technique algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- developing evaluation »
- evaluation technique »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The Background Subtraction technique has proved to be the best algorithm when historical document images were evaluated. …”
Get full text
Get full text
Thesis -
8
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…It was found that the proposed algorithm with FVSI as the objective function has been able to produce a better result as compared to the techniques developed in the literature.…”
Get full text
Get full text
Thesis -
9
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
10
A QOS Evaluation of the TCP Congestion Control Algorithm
Published 2010“…Networking evaluation techniques have been carried out different procedures and behavior for presenting the TCP/IP state over different areas. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
Get full text
Get full text
Thesis -
12
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…To evaluate the performance of the developed algorithm, the average PSNR value, average search point and average elapsed processing time is calculated. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017“…This project is about developing a Dam Haji game using A* search algorithm. …”
Get full text
Get full text
Thesis -
14
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In order to develop the proposed methods, the baseline techniques are studied to develop the proposed algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
15
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The results are evaluated by receiver operating characteristic (ROC) graph and the existing technique that gives the best performance is landscape expansion index. …”
Get full text
Get full text
Thesis -
16
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…This paper aims to develop data mining techniques for discovering motifs. …”
Get full text
Get full text
Get full text
Proceeding -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
Enhanced control algorithms for multilevel inverter-based shunt active power filter
Published 2017“…SAPF with all the proposed control algorithms is developed and evaluated in MATLAB-Simulink involving various highly nonlinear rectifier loads. …”
Get full text
Get full text
Get full text
Thesis -
19
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
20
Multilevel optimization for dense motion estimation
Published 2011“…We evaluated the performance of different optimization techniques developed in the context of optical flow computation with different variational models.In particular, based on truncated Newton methods (TN) that have been an effective approach for large-scale unconstrained optimization, we developed the use of efficient multilevel schemes for computing the optical flow.More precisely, we evaluated the performance of a standard unidirectional multilevel algorithm - called multiresolution optimization (MR/Opt), to a bidrectional multilevel algorithm - called full multigrid optimization (FMG/Opt).The FMG/Opt algorithm treats the coarse grid correction as an optimization search direction and eventually scales it using a line search. …”
Get full text
Get full text
Get full text
Monograph
