Search Results - (( developing knowledge scheduling algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…Using the dynamic programming algorithm developed, the model was also able to recalculate alternative schedules by replacing unavailable teams with other teams to avoid delays. …”
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Overview of metaheuristic: classification of population and trajectory by Zainul Rashid, Zarina

    Published 2010
    “…Some algorithms can be defined if the developer of the system has problem specific knowledge to the solution. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This thesis presents three significant contributions to the field of knowledge. The first contribution entails a study on server consolidation, which employs the Locust Scheduling Meta-Heuristic Algorithm (LACE). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of optimized maintenance scheduling model for coal-fired power plant boiler by Noor Fazreen Binti Ahmad Fuzi, Ms.

    Published 2023
    “…As part of the formulation, MILP and PSO are developed and tested extensively on the actual maintenance scheduling from the adopted power plant and through the expert’s judgements. …”
    text::Thesis
  10. 10

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…This provides a large corpus of information retrievable for data mining and knowledge discovery. The case study is focused on the investigation of machine breakdown and the effectiveness of scheduled maintenance with the application of data mining. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Motion planning and control for autonomous vehicle collision avoidance systems using potential field-based parameter scheduling by Nurbaiti, Wahid, Hairi, Zamzuri, Noor Hafizah, Amer, Dwijotomo, Abdurahman, Sarah ‘Atifah, Saruchi

    Published 2024
    “…This study proposed a motion planning and control strategy for an autonomous vehicle collision avoidance system based on the potential field (PF) approach with a combination of the parameter scheduling technique. A particle swarm optimization algorithm is used to optimize the knowledge database information that is developed based on the perception of driver toward risk in the driving environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Timetabling System for Medical Officer by Siti Noor Zahirah binti Mohd Zahari, Siti Noor

    Published 2012
    “…Thus, inspired by Prototyping – based methodology, Timetabling System for Medical officer was developed. This research studied about the scheduling algorithm, tools and knowledge required for system development and the development process involved. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Motion planning and control for autonomous vehicle collision avoidance systems using potential field-based parameter scheduling by Nurbaiti, Wahid, Hairi, Zamzuri, Noor Hafizah, Amer, Dwijotomo, Abdurahman, Sarah ‘Atifah, Saruchi

    Published 2024
    “…This study proposed a motion planning and control strategy for an autonomous vehicle collision avoidance system based on the potential field (PF) approach with a combination of the parameter scheduling technique. A particle swarm optimization algorithm is used to optimize the knowledge database information that is developed based on the perception of driver toward risk in the driving environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Web page design for electronic commerce / Lee Fong Wai by Lee , Fong Wai

    Published 2003
    “…The final part covers the problems encountered during system development process, the solutions taken, system evaluation by end users, the strength and limitation of the system, future enhancement of the system, knowledge and experience gained and conclusion towards the project. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dynamic approaches for spectrum control in cognitive radio networks by Mohamedou, Ahmed

    Published 2015
    “…To optimize Fuzzy Inference scheduler, Genetic Algorithm is used. Compared to fixed sensing order,this proposed technique managed to achieve an outstanding performance in term of channel utilization. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20