Search Results - (( java implementation modified algorithm ) OR ( basic complex machine algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- machine algorithm »
- basic complex »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Particle swarm optimization (PSO) for CNC route problem
Published 2002“…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
Get full text
Get full text
Undergraduates Project Papers -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017“…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
Get full text
Get full text
Final Year Project -
7
Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets
Published 2025“…Therefore, in this article, we introduced the notion of complex picture fuzzy sets and investigated their basic properties. …”
Article -
8
Cycle time minimization in production line using robust hybrid optimization algorithm
Published 2021“…The results obtained from their research have clearly portrayed the robustness of bio-inspired algorithms to cater complex problems. Assembly line, which is normally the last step of production that involves final assembly of the products. …”
Get full text
Get full text
Conference or Workshop Item -
9
Shot boundary detection based on orthogonal polynomial
Published 2019“…The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
Get full text
Get full text
Get full text
Article -
10
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The previous study found that the scheduling activity become complex when dealing with large number of machine, m > 2, it is NP-hardness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021
Published 2022“…In addition, the review paper will facilitate researchers who are new to machine learning algorithms for brain tumor recognition to understand the basics of the field and pave the way for them to be able to contribute to this vital field of medical research. …”
Get full text
Get full text
Get full text
Article -
14
Review of deep convolution neural network in image classification
Published 2017“…With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditional machine learning methods. …”
Get full text
Get full text
Get full text
Article -
15
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza
Published 2021“…The extracted features are evaluated through six machine learning (ML) classifiers namely softmax, k-nearest neighbor (kNN), support vector machine, linear discriminant analysis, decision tree, and naive Bayes. …”
Get full text
Get full text
Get full text
Thesis -
18
HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text
Published 2021“…Our method works better than other basic and CNN and RNN based hybrid models. In the future, we will work for more levels of text emotions from long and more complex text.…”
Get full text
Get full text
Get full text
Article -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
20
Handover Parameter for Self-optimisation in 6g Mobile Networks: A Survey
Published 2024journal::journal article
