Search Results - (( java implementation modified algorithm ) OR ( basic implementation level algorithm ))
Search alternatives:
- implementation modified »
- basic implementation »
- implementation level »
- java implementation »
- level algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Adaptive routing algorithms and implementation for TESH network
Published 2013“…The Tori-connected mESH (TESH) Network is a k-ary n-cube networks of multiple basic modules, in which the basic modules are 2D-mesh networks that are hierarchically interconnected for higher level k-ary n-cube networks. …”
Get full text
Get full text
Get full text
Article -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Implementation if PID controller for controlling the liquid level of the coupled tank system
Published 2009“…MATLAB has been used to simulate and verified the mathematical model of the controller. Visual Basic 6 has been used to implement the graphical user interface (GUI) and implementation issues for the controller's algorithms will also be discussed. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Implementation of PID controller for controlling the liquid level of the coupled tank system
Published 2008“…MATLAB has been used to simulate and verified the mathematical model of the controller. Visual Basic 6 has been used to implement the graphical user interface (GUI) and implementation issues for the controller’s algorithms will also be discussed. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…Swarm intelligence (SI) algorithm is implemented because there are lot of previous works which prove that the SI is good for segmentation and classification. …”
Get full text
Get full text
Thesis -
9
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
10
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
11
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008Get full text
Get full text
Final Year Project -
15
-
16
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
17
Level control (tank 1) of coupled tank liquid level system using integral control state feedback controller
Published 2009“…SIMULINK/MATLAB has been used to simulate and verified the mathematical model of the controller. Visual Basic 6 has been used to implement the graphic user interface (GUI) and implementation issues for the controller’s algorithms will also be discussed. …”
Get full text
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Speech Compression Using Discrete Wavelet Transform
Published 2003“…Basically, this scheme consists of four operations which are the transform, threshold techniques (by level and global threshold), quantization, and entropy encoding operations. …”
Get full text
Get full text
Thesis -
19
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…Subsequently, a computer algorithm and interfacing tool is developed. The tool enables any personal with basic computer literacy and access to the tool and data file to process the data and asses the HKP of the flight at ease. …”
Get full text
Get full text
Get full text
Thesis -
20
Application Of The Blockchain Technology Within Healthcare
Published 2021“…In order to help with the situation of COVID-19 pandemic, a predictive model on the infected patient’s severity level is constructed. The predictive model is used to forecast the severity level of a person who is infected with COVID-19 virus based on his various symptoms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
