Search Results - (( java implementation modified algorithm ) OR ( based computer self algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    SOMEA: self-organizing map based extraction algorithm for DNA motif identification with heterogeneous model by Lee, Nung Kion, Wang, Dianhui

    Published 2011
    “…Results: This paper aims to develop a Self-Organizing Map (SOM) based clustering algorithm for extracting binding sites in DNA sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12

    Self organizing multi-objective optimization problem by Ismail, Fatimah Sham, Yusof, Rubiyah, Khalid, Marzuki

    Published 2011
    “…In order to overcome these problems, this paper proposes a new self organizing genetic algorithm (SOGA) for multi-objective optimization problems. …”
    Get full text
    Get full text
    Article
  13. 13

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…Secondly, specification language, system design, mathematical and computational models for IPS and SH system are established, which are based upon nonlinear classification, prevention predictability trust, analysis, self-adaptation and self-healing algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur by Abdi Nur, Nur Linda

    Published 2007
    “…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Danger theory inspired artificial immune system for pattern recognition by Chung Seng Kheau, Rayner Alfred, Lau, Hui Keng, Jason Teo, Mohd. Hanafi Ahmad Hijazi, Nurul'alam Mohd. Yaakub

    Published 2007
    “…NS algorithm discriminates 'self' and 'non-self' patterns by acknowledging incoming negative instances. …”
    Get full text
    Get full text
    Research Report
  20. 20

    Danger theory metaphor in artificial immune system for system call data by Anjum Iqbal, Anjum Iqbal

    Published 2006
    “…In immunology, there are two distinct viewpoints about main goal of IS; self-non-self and danger theory. Most of the existing AIS are based on classical self-non-self perspective. …”
    Get full text
    Get full text
    Thesis