Search Results - (( developing using generalised algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Ball surface representations using partial differential equations by Kherd, Ahmad Saleh Abdullah

    Published 2015
    “…Thus, this research develops an algorithm to generalise Ball surfaces from boundary curves using elliptic PDEs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…A generalised variable order variable stepsize Direct Integration (01) method, a generalised Backward Differentiation method (BDF) and shooting techniques are used to solve the given BVP. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fault diagnosis in unbalanced radial distribution networks using generalised regression neural network by Mirzaei, Maryam

    Published 2011
    “…Nowadays, about 80% of interruptions are caused by faults in distribution networks and the application of fault location algorithms developed for transmission system is not an easy task due to the topology and operating principles of the distribution networks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Methodology to develop heuristic for re-entrant flow shop with two potential dominant machines using bottleneck approach by Bareduan, Salleh Ahmad, Hasan, Sulaiman

    Published 2012
    “…This paper presents a bottleneck-based methodology to solve scheduling problem of M1,M2,M3,M4,M3,M4 re-entrant flow shop where M1 and M4 have high tendency of being the dominant machines. Two generalised makespan algorithms using bottleneck approach were developed for the identified bottleneck. …”
    Get full text
    Get full text
    Article
  10. 10

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Explicit solution of parameter estimate using multiparametric programming for boost converter by Mid, E.C., Mukhtar, N.M., Syed Yunus, S.H., Abdul Hadi, Dayanasari, Ruslan, Eliyana

    Published 2023
    “…This work proposes an approach to estimate the parameters of capacitance and inductance in a boost converter using an explicit solution. A multiparametric programming (MPP) algorithm is fundamental to the suggested methodology, which aims to develop parameters as explicit functions of measurements. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Transtheoretical model of change for weight control in Malaysian context by Chang, Ching Thon

    Published 2010
    “…Empirical support of the effectiveness of weight control using Transtheoretical Model of Change (TIM) as the framework have been demonstrated by some studies and clinical practice for weight control in developed countries. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu by Yusnita, Muhamad Noor

    Published 2018
    “…It can be concluded that the algorithm and model proposed were useful for the development of the prototype. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    New Sequential and Parallel Division Free Methods for Determinant of Matrices by Sharmila, Karim

    Published 2013
    “…In conclusion, the newly developed methods can be used as viable alternatives for finding determinants of matrices.…”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours by Baneamoon, Saeed Mohammed Saeed

    Published 2010
    “…A Distributed Learning Classifier System (DLCS) consisting of five Learning Classifier Systems (LCS) with hierarchical architecture of three levels is used. An enhanced Bucket Brigade Algorithm (BBA) is developed to avoid the problem of choosing classifiers with high strength value but with incorrect behaviour. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Predicting saliency existence using reduced salient features based on compactness and boundary cues by Nadzri, Nur Zulaikhah

    Published 2020
    “…The selected salient features were trained, tested and compared on 3 learning algorithms which included generalised linear regression, Naïve Bayes, and Support Vector Machine. …”
    Get full text
    Get full text
    Thesis