Search Results - (( java implementation modified algorithm ) OR ( based computer work algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…Feature extraction is a preliminary step before 3D reconstruction and therefore, a junction detection algorithm is proposed. The presented algorithm benefits in omitting unnecessary junctions that are problematic for object recognition in comparison to the closest algorithm to our work. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid test redundancy reduction strategy based on global neighborhood algorithm and simulated annealing by Kamal Z., Zamli, Norasyikin, Safieny, Fakhrud, Din

    Published 2018
    “…There are already many works in the literature exploiting the greedy computational algorithms as well as the meta-heuristic algorithms, but no single strategy can claim dominance in terms of test data reduction over their counterparts. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12

    An efficient VM scheduling algorithm to minimize the makespan and maximize the profit by Ibrahim, Aws Fadhil

    Published 2019
    “…The second process is hyper analytical task scheduling algorithm, and based on the scheduled task, the policy based profit maximization algorithm was proposed in final process. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Local Stereo Matching Algorithm Using Modified Dynamic Cost Computation by Kadmin, Ahmad Fauzan, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Hamid, Mohd Saad, Tg. Wook, Tg Mohd Faizal

    Published 2021
    “…Traditional framework composition consists of several constraints in stereo correspondences such as illumination variations in images and inadequate or non-uniform light due to uncontrollable environments. This work improves the local method stereo matching algorithm based on the dynamic cost computation method for depth measurement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…For fingerprint database optimisation, novel access point (AP) selection algorithms which are based on variant AP selection are investigated to improve computational accuracy compared to existing AP selection algorithms such as Max-Mean and InfoGain. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali by Hilyati Hanina, Zazali

    Published 2012
    “…It is a new approach which performs core operation using multiplication of points based in ECC. The algorithm explores computational advantages of computing cofactor number of points on E and it is computationally infeasible to obtain if the cofactor are large enough. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…Third, to propose a fault-intrusion-tolerant algorithm (FITSW), which is based on both fault and intrusion-tolerant techniques, to decrease the adverse impact caused by different faults (accidental and malicious) in cloud computing systems. …”
    Get full text
    Get full text
    Thesis