Search Results - (( java implementation modified algorithm ) OR ( basic relationship based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…This study uses the genetic algorithm radial basis, neural network model, to make judgments on the relationships contained in this sequence and compare and analyze the prediction effect and generalization ability of the model to verify the applicability of the genetic algorithm radial basis, neural network model, based on the modeling of historical data, which may contain linear and nonlinear relationships by itself, so this study uses the genetic algorithm radial basis, neural network model, to make, compare, and analyze judgments on the relationships contained in this sequence.…”
    Get full text
    Get full text
    Article
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Memory-based Immune Network for Multi-Robot Cooperation by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2009
    “…Our proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Interval-valued fuzzy soft topology and its applications in group decision-making problems by Altwer, Mabruka Ali Juma

    Published 2022
    “…This generalization shows a deeper insight into the decision-making processed based on preference relationship. In this thesis, we develop two multi algorithms based on the interval-valued fuzzy soft topology to overcome different situations in decision-making problems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-Robot Cooperation using Immune Network with Memory by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2009
    “…Our proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column by M. Yunus, M. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Microsoft AccessTM and Visual BasicTM have been used to develop the knowledge-based and the inference engine respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Generally, most of the algorithmic models were generated based on historical projects, and therefore, the same methodology has been applied in this research work. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm by Abu, Md Sahrom

    Published 2021
    “…The results showed that CTI-AR effectively identify the attributes, relationship between attributes and attribution level group of cyberattack in CTI. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Neural Network – A Black Box Model by Kuok, Kuok King, Chan, Chiu Po, Md. Rezaur, Rahman, Khairul Anwar, Mohamad Said, Chin Mei, Yun

    Published 2024
    “…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  19. 19

    A Refined Immune Systems Inspired Model for Multi-Robot Shepherding by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2010
    “…The proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Refined Immune Systems Inspired Model For Multi-robot Shepherding by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2010
    “…The proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Conference or Workshop Item