Search Results - (( development strategy using algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A Summary Sentence Decomposition Algorithm for Summarizing Strategies Identification by Idris, N., Baba, S., Abdullah, R.

    Published 2009
    “…This paper reports on our effort to develop an algorithm to identify the summarizing strategies employed by students using summary sentence decomposition. …”
    Get full text
    Get full text
    Article
  7. 7

    An Algorithm for Summarizing Strategies Identification by Idris, N., Mohd Sapiyan, B., Abdullah, R.

    Published 2008
    “…The strategies used by experts are identified and translated into a set of heuristic rules where the algorithm is developed based on the heuristic rules.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…But virtually none have been developed to assess the process particularly in identifying the strategies used. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimal charging strategy for plug-in hybrid electric vehicle using evolutionary algorithm by Lee, Clement Yuon Sien

    Published 2016
    “…An optimal charging strategy for plug-in hybrid electric vehicle (PHEV) is proposed and developed by using evolutionary algorithm to obtain the most suitable charging condition for each PHEV charging. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation by Hasneeza Liza, Zakaria

    Published 2020
    “…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…There are different algorithms used as a regenerative braking strategy. …”
    Get full text
    Get full text
    Thesis
  14. 14

    On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B., Alsewari, Abdulrahman A.

    Published 2015
    “…Although useful, strategies based on the aforementioned optimization algorithms are not without limitation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The findings of the study show that, there is a strong relationship between the summary writing proficiency of students and the summarizing strategies that they used. We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Iteration strategy and ts effect towards the performance of population based metaheuristics by Nor Azlina, Ab. Aziz, Nor Hidayati, Abdul Aziz, Azlan, Abd Aziz, Tasiransurini, Abdul Rahman, Wan Zakiah, Wan Ismail, Zuwairie, Ibrahim

    Published 2020
    “…A researcher developing a new population-based algorithm need to identify the best strategy so that the performance of the algorithm proposed is maximized.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Hybrid flower pollination algorithm strategies for t-way test suite generation by Abdullah, Nasser, Kamal Z., Zamli, Alsewari, Abdulrahman A., Ahmed, Bestoun S.

    Published 2018
    “…Consequently, many useful meta-heuristic algorithms have been developed on the basis of the implementation of t-way strategies (where t indicates the interaction strength). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Non-dominated sorting manta ray foraging algorithm with an application to optimize PD control by Abdul Razak, Ahmad Azwan, Nasir, Ahmad Nor Kasruddin, Abd Ghani, N. M., Mohammad, Shuhairie, Mat Jusof, Mohd Falfazli, Mhd Rizal, Nurul Amira

    Published 2022
    “…This paper presents a multi-objective (MO) version of Manta Ray Foraging Algorithm (MRFO) by using components in Non-Dominated Sorting Genetic Algorithm (NSGAII). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Develpoment of combinatorial optimisation for cutting tool path strategy by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2009
    “…The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
    Get full text
    Get full text
    Conference or Workshop Item