Search Results - (( java implementation modified algorithm ) OR ( gate operation using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimization of Digital Electronic Circuit Structure Design Using Genetic Algorithm by Chong, Kok Hen

    Published 2008
    “…The complexity of the digital electronic circuit is due to the number of gates used per system as well as the interconnection of the gates. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evalution of binary simulated Kalman filter and its application on airport gate scheduling by Zarifah, Mohamad Nor

    Published 2016
    “…Exploitation of the distance between an agent and the best agent let the SKF operates in binary search space. In this study, the airport gate allocation problem is solved using extended version of Simulated Kalman Filter algorithm called Binary Simulated Kalman Filter (BSKF).The main objective of this study is to minimize the total walking distance of passengers either from a gate to entrance/exit or gate to a gate. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6
  7. 7

    PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA) by ZAINUDDIN, ZAHIRAH

    Published 2023
    “…In this case, Deep Learning (DL) is chosen to construct the prediction activity for estimating the life expectancy of an equipment. Gated Recurrent Unit (GRU) algorithm is used to cater the predicting action of equipment state based on data from an oil and gas industry.…”
    Get full text
    Get full text
    Thesis
  8. 8

    FPGA based Twofish Algorithm by Muhammad Imran, Ahmad, Mohd Nazrin, Md Isa, Abdul Halis, Abdul Aziz, Mohd Fisol, Osman

    Published 2009
    “…This paper presents the architecture of Twofish algorithm implemented with field programmable gate array (FPGA). …”
    Get full text
    Working Paper
  9. 9

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…In order to program the FPGA, Verilog Hardware Description Language (Verilog HDL) is used. The radix-4 FFT algorithm will be implemented for 64 and 256 points using both 8-bit and 16-bit input width. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…It is an iterative process of rotations that are carried out through simple shift and addition operations. These operations map well onto hardware, and CORDIC is used in a multitude of signal processing applications. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., El-Shafie A.

    Published 2024
    “…The effectiveness of analyzing large amounts of data that comes with engaging climate change scenarios, for planning advanced reservoir management can be achieved through the use of optimization algorithms. The Whale Optimization Algorithm (WOA) is a swarm intelligence algorithm derived following animal-behaviour-based concepts. …”
    Conference Paper
  15. 15

    Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam by Lai, Vivien Mei Yen

    Published 2023
    “…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…These limitations in XTS have been successfully overcome by the enhanced parallel XTS mode of operation which gives a 1.80 speedup factor with 90 percent efficiency using AES as an encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization of reservoir operation at Klang Gate Dam utilizing a whale optimization algorithm and a L�vy flight and distribution enhancement technique by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., El-Shafie A.

    Published 2023
    “…Taking it further, the KGD was studied using the nature-inspired meta-heuristic algorithms (MHAs). …”
    Article
  18. 18

    Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation by Ismail, Mohd. Izuan

    Published 2006
    “…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Designing and optimizing digital circuit using FPSGA and DH by Kamil K., Chong K.H., Raveendran S.K.

    Published 2023
    “…The resulted circuit is verified using XILINX ISE Design Suite 13.2. The result obtained shows that the circuit is function and able to operate with minimum number of gates. � 2013 IEEE.…”
    Conference paper