Search Results - (( java implementation modified algorithm ) OR ( framework implementation some algorithm ))
Search alternatives:
- framework implementation »
- implementation modified »
- java implementation »
- implementation some »
- some algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The framework is used to increase the implementation performance of quantum algorithms. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…Based on the framework, a prototype was implemented to evaluate the accuracy of the proposed technique. 52% is the highest accuracy obtained from the technique by using ten-fold cross validation. …”
Get full text
Get full text
Thesis -
7
Rapid software framework for the implementation of machine learning classification models
Published 2021“…The machine learning model in the two platforms were tested on breast cancer and tax avoidance datasets with Decision Tree algorithm. The results indicated that although the software framework is easier than the programming platform for implementing the machine learning model, the results from the software framework were highly accurate and reliable. …”
Get full text
Get full text
Article -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
An Improved Diabetes Risk Prediction Framework : An Indonesian Case Study
Published 2018“…Lack of diagnosis for diabetes often transpire in some ASEAN countries with relatively diminutive doctor to patient ratio.Essentially,it is believed that a systematic framework to predict diabetes risk factors is crucial for refining diagnostics and improving accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
12
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016“…Heuristic Kalman Algorithm (HKA) also is inspired by the Kalman Filter framework. …”
Get full text
Get full text
Conference or Workshop Item -
13
A conceptual model for the E-commerce application recommendation framework using exploratory search
Published 2024journal::journal article -
14
Cloud-Mobi Framework using hybrid AHP-ACO method for Social Interaction and Travel Planning
Published 2013“…Our future work will focus on developing the travel recommendation system prototype to implement the proposed framework.…”
Get full text
Get full text
Conference or Workshop Item -
15
End-to-End Security Mechanism Using Blockchain for Industrial Internet of Things
Published 2025“…Additionally, the IIoT environment can benefit from implementing security frameworks that reflect their characteristics. …”
Get full text
Get full text
Get full text
Article -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Improving the Knowledge Management Processes Through a Multi-agent Knowledge Audit Framework
Published 2023“…The MAKA framework's completed examination results propose some recommendations that generally need to be looked into while implementing ITMS�s KM advancements. …”
Conference Paper -
18
Error concealment technique using wavelet neural network for wireless transmitted digital images
Published 2012“…Moreover, the concealment includes patches for both smooth and nonsmooth areas. This framework is implemented in three key steps. The first step is devoted to detecting invisible patches. …”
Get full text
Get full text
Thesis -
19
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…It added more flexibility to the Linux CPU heduler. It has been implemented in three layers, kernel, modules, and user interface layer, to simplify the framework development and maintenance as well as to maintain performance. …”
Get full text
Get full text
Thesis -
20
Embedded car plate image recognition system
Published 2008“…The initial step in the recognition process is obtaining a photo of the vehicle, usually by use of a mounted camera. After this, some type of algorithm must be performed to transform an image to a string consisting of the license plate number. …”
Get full text
Learning Object
