Search Results - (( java implementation modified algorithm ) OR ( causing problems faced algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Tolerable Constructive Graph-Based Hyper-Heuristic Algorithm For Examination Timetabling by Mohammad Pour, Shahrzad

    Published 2009
    “…Examination Timetabling Problem (ETTP) is an NP-hard typical optimization problem faced by institutions and universities across the world. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…This creates such problems and one of the root causes is the amount variables used by design engineers. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Development Of An Algorithm To Reduce The Topographical Effects In Reflected Radiance by Yeap, Eng Choo

    Published 2020
    “…Topographic effects in satellite images are not errors but distortions caused by the solar and surface geometry. Surfaces facing towards the Sun tend to be brighter while surfaces facing away from the Sun are generally darker. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…For most face recognition algorithms, partial occlusions affect the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Attendance management system with half-covered and full-facial recognition feature by Goh, Kah Ong, Law, Check Yee, Tin, Cu Kang, Tee, Connie, Sek, Yong Wee

    Published 2023
    “…However, following the outbreak of pandemic COVID-19, we are strongly advised to always put on a face mask to protect ourselves and others. This practice has caused problems to existing attendance management system with facial recognition. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Ultrasonic parking sensors using triangulation algorithm / Mohamad Syahzmeer Mohamed Sufian by Mohamed Sufian, Mohamad Syahzmeer

    Published 2019
    “…The main cause of this problem is the vehicle's inherent blindspot that the drivers have to face during a reversing maneuver and also the innacuraccy of the parking sensors in measuring the distance accurately. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud by Ag Daud, Ag Ibrahim

    Published 2017
    “…These access points can cause signal interference between access points if the selected channel are the same or overlapping. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…Finally, this study aims to obtain high-accuracy face recognition performance under the uncontrolled environment of a smartphone database based on the proposed adaptive face recognition method that combines two new face recognition algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Face recognition for varying illumination and different optical zoom using a combination of binary and geometric features by Khalid, Fatimah, Amjeed, Noor, O.K. Wirza, Rahmita Wirza, Madzin, Hizmawati, Azizan, Illiana

    Published 2020
    “…In addition, various length of face-to-camera distance gives significant problem affect for the performance of face recognition method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing by Shakir M., Abubakar A.B., Yousoff Y., Al-Emran M., Hammood M.

    Published 2023
    “…Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). …”
    Article