Search Results - (( development programmes may algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…For hardware implementation of the design, an Altera Field Programmable Gate Array (FPGA) device, EP20K200EFC484-2X from APEX family, APEX 20KE, has been used. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Predicting usage for a marketable e-learning portal by Yaacob, Aizan, Yusof, Yuhanis, Sheik Osman, Wan Rozaini, Derashid, Chek, Omar Khan, Zainizad

    Published 2014
    “…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Web-based system for prioritization of research area in FSKM: a web system engineering approach / Mohd Azmeer Omar by Omar, Mohd Azmeer

    Published 2012
    “…Then the most important research is calculated using scoring algorithm. The systems is developed using web system engineering approach with the latest Java technology and web framework to simplify development process. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Design And Development Of Gas Argon Purging System by Ooi, Seng Yeong

    Published 2006
    “…Using a single pneumatic control valve with PI feedback controllers test, a method is proposed to design and develop to the current gas argon purging system while to identify that the present 6 different kinds of digital control valve may not give the actual flow rate to the liquid steel purging system. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Preliminary study on fault detection using artificial neural network for water-cooled reactors by Abdul Karim, Julia, Lanyau, Tony, Maskin, Masleha, Anuar, M. A. S., Che Soh, Azura, Abdul Rahman, Ribhan Zafira

    Published 2020
    “…This work was carried out to discover the use of an artificial neural network (ANN) to model and develop a fault detection programme in the RTP cooling system. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Vector evaluated particle swarm optimization approach to solve assembly sequence planning problem by A. Mukred, Jameel A., A. Rahim, Ruzairi, Mohamad, Elmy Johana, Salh, Adeeb, Ashyap, Adel Y. I., Abdullah, Qazwan, AL-Fadhali, Najib, Al-Ameri, S., Al-Ashwal, Rania

    Published 2022
    “…When number of parts increase the problem became more complex. Heuristic methods developed to overcome this complicity. It is more efficient but it may stick in local optima, no guarantee that global optima may be found. …”
    Get full text
    Get full text
    Article
  17. 17

    The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh by Mat Jusoh, Julia Ashazila

    Published 2020
    “…Copy number variation (CNV) may contribute to the development of HT LVH+. Three hundred hypertensive participants among whom 100 had LVH, underwent genome-wide genotyping of copy number variation using microarray. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…However, the mechanisms needed to detect first-order SQLIV, which may lead to SQLIA on the application level, may not afford to catch second-order SQLIV. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Population genetic structure of Malayan Tapir (Tapirus indicus Desmarest) in Peninsular Malaysia by Lim, Qi Luan

    Published 2019
    “…The lack of such information may impede the on-going efforts for its conservation and management. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…Energy resources and their management is one of the prime challenges to world especially developing countries like Malaysia where the significant contribution to energy generation is based on imported resources. …”
    Get full text
    Get full text
    Undergraduates Project Papers