Search Results - (( java implementation modified algorithm ) OR ( affect perception study algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah by Abdullah, Muhamad Faizol Adli

    Published 2010
    “…These entire elements will affect the speed of natural network learning. In this study, the optimization algorithm, PSO is chosen and applied in feedforward neural network to enhance the learning process. …”
    Get full text
    Get full text
    Thesis
  9. 9

    AI-driven journalism: Examining the impact on news credibility and public trust in The Star by Helmi Nafiz, Lee

    Published 2025
    “…Ethical concerns, such as algorithmic bias and accountability, also significantly affect trust. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Audience Responses to Newspaper Coverage of Floods in China: Victims Versus Onlookers by Ning, Li, Ting, Su Hie

    Published 2026
    “…Framing studies show a favourable portrayal of the China government’s flood management but how does newspaper coverage shape readers’ perceptions and attitudes towards floods? …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    AUDIENCE RESPONSES TO NEWSPAPER COVERAGE OF FLOODS IN CHINA: VICTIMS VERSUS ONLOOKERS by Ning, Li, Ting, Su Hie

    Published 2026
    “…Framing studies show a favourable portrayal of the China government’s flood management but how does newspaper coverage shape readers’ perceptions and attitudes towards floods? …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Elicitation of conditional probability table (CPT) for risk analysis of biomass boiler in energy plant by Ahmad Nur Fikry, Zainuddin, Nurul Ain Syuhadah, Mohammad Khorri, Nurul Sa'aadah, Sulaiman, Alaw, Fares Ahmed

    Published 2022
    “…The formulation for boiler failures likelihood prediction that relies on experts’ perceptions was developed using the Weighted Sum Algorithm (WSA). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    The relationships between brand attributes and word of mouth on brand identity and brand image by Al Kasassbh, Hazem Mohamad Abd Al Ghany

    Published 2017
    “…Insufficient empirical attention, particularly in relation to the attribution theory, was the driving force for the current study to be undertaken. Two hundred and fifty-four travellers via two airports located in the northern region of Malaysia participated in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Prediction of sleep pattern for university students using machine learning by Widya, Muhammad Faishal Atha, Utoro, Rio Korio, Roedavan, Rickman, Soegiarto, Duddy, Moorthy, Kohbalan, Pratondo, Agus

    Published 2026
    “…Sleep patterns significantly affect the health and academic performance of university students. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Artificial neural network modeling of grinding of ductile cast iron using water based sio2 nanocoolant by M. M., Rahman, K., Kadirgama, Azma Salwani, Ab Aziz

    Published 2014
    “…An artificial neural network model is developed for predicting the surface roughness and MRR. Multi-layer perception and a batch back propagation algorithm are used. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19