Search Results - (( developing human modified algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Comparison of path planning in simulated robot by Ch’ng, Chee Yu’ng

    Published 2020
    “…There are 4 path planning algorithms will be compared, which are Dijkstra’s algorithm, A* algorithm, RapidExploring Random Tree (RRT) algorithm, and the last one is an algorithm modified from A*. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    M-Factors Fuzzy Time Series for Forecasting Moving Holiday Electricity Load Demand in Malaysia (S/O 14589) by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod, Zaini, Bahtiar Jamili

    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Weighted subsethood and reasoning based fuzzy time series for moving holiday electricity load demand forecasting by Rosnalini, Mansor

    Published 2021
    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Fast marching method and modified features fusion in enhanced dynamic hand gesture segmentation and detection method under complicated background by Khalid, Eman Thabet, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2018
    “…Recent development in the field of human–computer interaction has led renewed interest in dynamic hand gesture segmentation based on gesture recognition system. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…The Takagi-Sugeno-Kang (TSK) type fuzzy inference system was chosen and constructed by an automatic generation of clusters as well as membership functions and minimal rules through the use of hybrid fuzzy clustering and the modified apriori algorithms respectively. The developed TSK type fuzzy inference engine is called modified adaptive fuzzy inference engine (MAFIE) and its parameters were then adjusted by the hybrid learning algorithm using adaptive neural network architecture towards improved performance which is called MANFIE. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Interactive design psychology and artificial intelligence-based innovative exploration of Anglo-American traumatic narrative literature by Hou, Xia, Omar, Noritah, Wang, Jue

    Published 2022
    “…Finally, AI technology and ID psychology are used to modify a famous TN work respectively and synergically, and the modified work is appreciated by respondents to collect their comments. …”
    Get full text
    Get full text
    Article
  14. 14

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Speech enhancement using deep neural network based on mask estimation and harmonic regeneration noise reduction for single channel microphone by Md Jamal, Norezmi

    Published 2022
    “…The development of speech-enabled mobile applications has greatly improved human-computer interaction in recent years. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Transparency improvement by external force estimation in a time-delayed nonlinear bilateral teleoperation system by Amini, H., Rezaei, S.M., Sarhan, A.A.D., Akbari, J., Mardi, N.A.

    Published 2015
    “…Teleoperation systems have been developed in order to manipulate objects in environments where the presence of humans is impossible, dangerous or less effective. …”
    Get full text
    Get full text
    Article
  19. 19

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Therefore, this thesis develops a solution to detect ongoing human action as soon as it begins, but before it finishes. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimal parameter estimation of MISO system based on fuzzy numbers / Razidah Ismail ... [et al.] by Ismail, Razidah, Ahmad, Tahir, Ahmad, Shamsuddin, Ahmad, Rashdi Shah

    Published 2006
    “…Thus, this paper discusses the development of a Fuzzy State Space algorithm for optimal parameter estimation in multiple-input single-output (MISO) system based on fuzzy numbers. …”
    Get full text
    Get full text
    Article