Search Results - (( developing special data algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- developing special »
- data algorithm »
- special data »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE
Published 2021“…This study aims to design learning media algorithms and data structures based on Android. The research method uses a waterfall-type system development life cycle (SDLC). …”
Get full text
Get full text
Get full text
Proceeding -
7
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
8
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
9
An estimation algorithm for improved maritime obstacle detection
Published 2024“…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022“…In combinatorial design theory, clustering elements into a set of three elements is the heart of classifying data, which has recently received considerable attention in the fields of network algorithms, cryptography, design and analysis of algorithms, statistics, and Information theory. …”
Get full text
Get full text
Get full text
Article -
11
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…This paper presents an algorithm for extracting underlying frequency components of massive Electroencephalogram (EEG) data. …”
Get full text
Get full text
Get full text
Article -
12
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Then they are assigned to the machines according to the assignment algorithm for job combinations, which is a special integer partition algorithm. …”
Get full text
Thesis -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
14
Data Analysis and Machine Learning Algorithms Evaluation for Bioliq AI-based Predictive Tool
Published 2019Get full text
Get full text
Final Year Project -
15
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…This study focuses fully on the development of a system of monitoring the health data of Covid-19 patients who undergoing self-quarantine by means of data classification. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
17
Rule-based filtering algorithm for textual document
Published 2017“…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
Get full text
Get full text
Get full text
Article -
18
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
19
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
Get full text
Get full text
Thesis -
20
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
Get full text
Get full text
Thesis
