Search Results - (( java implementation modified algorithm ) OR ( basic step function algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Landslide susceptibility and hazard assessments are the most important steps in landslide risk mapping. The main objective of this study was to investigate and compare the results of two artificial neural network (ANN) algorithms, i.e., multilayer perceptron (MLP) and radial basic function (RBF) for spatial prediction of landslide susceptibility in Vaz Watershed, Iran. …”
    Get full text
    Get full text
    Article
  6. 6

    A preemptive utility accrual scheduling algorithm in adaptive real time system. by Ahmad, Idawaty, Subramaniam, Shamala, Othman, Mohamed, Othman, Muhammad Fauzan

    Published 2008
    “…We consider independent task models that are subject to deadline constraints specified using step time/utility functions (or TUFs). The basic idea of our algorithm is to reduce the number of unnecessary abortion that occurs in GUS by preemption instead of abortion. …”
    Get full text
    Get full text
    Article
  7. 7

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming by Abdul Rahim, Ruzairi, Mohd. Nayan, Norkharziana, Fazalul Rahiman, Mohd. Hafiz

    Published 2006
    “…In order to process and simulate a tomography system, it has been found that Visual C++ programming has an advantage one step ahead compared to Visual Basic programming. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Simulation on Emotion Recognition for Autism Therapy by Adzmi, Muhammad Azrin

    Published 2017
    “…Deriving an effective facial representation from authentic face snap shots is an essential step for a success facial features reputation. On this paper, we empirically evaluate facial representation based totally on statistical local functions, neighborhood Binary styles, for person-independent facial expression recognition. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Memoryless modified symmetric rank-one method for large-scale unconstrained optimization by Modarres, Farzin, Abu Hassan, Malik, Leong, Wah June

    Published 2009
    “…Problem statement: Memoryless QN methods have been regarded effective techniques for solving large-scale problems that can be considered as one step limited memory QN methods. In this study, we present a scaled memoryless modified Symmetric Rank-One (SR1) algorithm and investigate the numerical performance of the proposed algorithm for solving large-scale unconstrained optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…The design of the APFLC is initially started with the designation of Basic FLC with two input and single output system. …”
    Get full text
    Thesis
  15. 15

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…Unfortunately, in existing methods, the collection of IFS data in the first step synchronizes badly, which results in lousy image quality in the decoding step. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Implementation of Symmetric Rank-One Methods for Unconstrained Optimization by Khiyaban, Farzin Modarres

    Published 2010
    “…In this method, the Hessian approximation is updated based on modifed secant equation, which uses both gradient and function value information in order to get a higher-order accuracy in approximating the second curvature of the objec- tive function. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Catalytic conversion of methane and carbon dioxide in conventional fixed bed and dielectric barrier discharge plasma reactors by Istadi, Istadi

    Published 2006
    “…Moreover, the operating parameters, such as the CO2/CH4 feed ratio and reactor temperature, and the catalyst compositions, such as wt% CaO and wt% MnO, were optimized by using Weighted Sum of Squared Objective Functions algorithm. The synergistic effect of basicity and reducibility towards the catalytic activity were also addressed using XRD, CO2-TPD and H2-TPR. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt by Shaffiei, Zatul Alwani

    Published 2021
    “…In addition, the statistical analysis using Wilcoxon Rank-Sum Test and Bonferroni-Holm Correction as well as Box–Whisker plotting demonstrated that the SBHS2-opt has a significant difference in most of the experiments and was more stable in searching the best solution compared to HS, improved HS, parameter adaptive HS and step function HS.…”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    The identification of alcohol percentage limit in halal food using fuzzy logic by Mohd Ali, Jarinah, Othman, Suhaili, Ahmad Fadzillah, Nurrulhidayah, Abd. Rahman, Norliza

    Published 2021
    “…This algorithm and basic framework will be the first step in developing a user-friendly tool that will later benefit the consumer as well as function as an auditor especially in order to control the alcohol content in halal food and beverages.…”
    Get full text
    Get full text
    Get full text
    Book Chapter