Search Results - (( java implementation case algorithm ) OR ( using execution modified algorithm ))

Refine Results
  1. 1

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  2. 2

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Modified LRE-TL Real-Time Multiprocessor Scheduling Algorithm by Alhussian, Hitham, Zakaria, Mohd Nordin, Hussin, Fawnizu Azmadi, Bahbouh, Hussein T

    Published 2013
    “…We have conducted an independent-samples t test to compare tasks migration using the original LRE-TL algorithm and the modified algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A modified LRE-TL real-time multiprocessor scheduling algorithm by Alhussian, H., Zakaria, N., Hussin, F.A., Bahbouh, H.T.

    Published 2014
    “…We have conducted an independent-samples t-test to compare tasks migration using the original LRE-TL algorithm and the modified algorithm. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Reducing Tasks Migration in LRE-TL Real-time Multiprocessor Scheduling Algorithm by Alhussian, Hitham, Nordin, Zakaria M, Hussin, Fawnizu Azmadi, Bahbouh, Hussein T.

    Published 2013
    “…To verify our work, an independent-samples t-test is used to compare tasks migration using the original LRE-TL algorithm and the modified one. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    New algorithm for autonomous dynamic path planning in real-time intelligent robot car by Mohammed, Akeel Ahmed, Hassan, Mohd Khair, Aris, Ishak, Kamsani, Noor Ain

    Published 2017
    “…Different algorithms have been used to address this problem by considering the optimal path with minimum cost; however, these algorithms did not consider the execution time to find such path. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20

    Dynamic obstacle handling in multi-robot coverage by Tay, Wing Le

    Published 2024
    “…The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis