Search Results - (( java implementation modified algorithm ) OR ( building process using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- building process »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…Finally, the global CDN build using the algorithm is evaluated based on the time needed to build the global CDN and the clock buffer numbers and areas used. …”
Get full text
Get full text
Thesis -
6
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…This research aims to assist the evacuees to find the shortest path in a high rise building using a shortest path algorithm. The objective is to design and develop an evacuation route using shortest path algorithm based on the evacuation map of the building. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
Get full text
Get full text
Thesis -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
Get full text
Get full text
Research Report -
10
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Consumption-Based Priority Algorithm for Energy Consumption
Published 2024“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Contour generation for mask projection stereolithography 3D printing
Published 2019“…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
Get full text
Get full text
Thesis -
13
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Consumption-Based Priority Algorithm for Energy Consumption
Published 2025“…According to recent research, buildings may reduce their energy use by up to 30% via improved operations, which are often based on effective energy management using the load priority algorithm. …”
Article -
15
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…An Intelligent Learning System for the turning process was developed. Visual C++ object-oriented programming language was used to build the Intelligent Learning System for Turning. …”
Get full text
Get full text
Thesis -
16
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…Meanwhile, practitioners who are usually non-experts and lack of statistical knowledge will face difficulties during the modelling process. Hence, algorithm with a step by step guidance is beneficial in model building, testing and selection. …”
Get full text
Get full text
Get full text
Thesis -
17
Information retrieval system (IRS) process on Hansard document / Suraya Saad
Published 2007“…The algorithm will be developed to split the document into few subdocuments by using keywords. …”
Get full text
Get full text
Thesis -
18
Improved building roof type classification using correlation-based feature selection and gain ratio algorithms
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Cryptanalysis in cryptographic algorithm design
Published 2006“…It also helps the cryptography community in building more secure algorithms.…”
Get full text
Conference or Workshop Item -
20
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Dijkstra's algorithm is one of the algorithms that could be used in network analysis process especially for 2D shortest route data. …”
Get full text
Get full text
Get full text
Thesis
