Search Results - (( java implementation modified algorithm ) OR ( knowledge driven implementation algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Clustering for binary data sets by using genetic algorithm-incremental K-means by Saharan, S., Baragona, R., Nor, M. E., Salleh, R. M., Asrah, N. M.

    Published 2018
    “…This research was initially driven by the lack of clustering algorithms that specifically focus in binary data. …”
    Get full text
    Get full text
    Article
  6. 6

    A PLC-based Hybrid Fuzzy PID Controller for PWM-driven Variable Speed Drive by ARROFIQ, MUHAMMAD

    Published 2010
    “…The widely used conventional control that is based on mathematical model of the controlled system is very complex and not easy to be determined since it requires explicit knowledge of the motor and load dynamics. This thesis proposed a design and implementation of a PLC-based hybrid controller from a basic PLC to a PWM-driven variable-voltage variable-frequency (VVVF) speed control of an induction motor and the analysis, evaluation and improvement of the control strategies. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Predicting YSPSAH's product preferences across department of private hospitals by Abd Malik, Nur Aisyah Syahirah

    Published 2025
    “…Future enhancements could involve integrating real-time data and testing advanced forecasting algorithms to improve model performance. Overall, this project demonstrates the potential of predictive modelling and MBA to transform historical sales data into strategic knowledge, optimising procurement planning and enhancing operational efficiency in the pharmaceutical industry.…”
    Get full text
    Get full text
    Student Project
  10. 10

    Accept or reject? Predicting ideation outcomes through enterprise social media by Rozaidi, Nik Ahmad, Gibbs, Jennifer L., Eisenberg, Julia

    Published 2017
    “…Implementing social media in the workplace may make it easier for employees to participate in knowledge sharing activities such as Q&A and ideation.However, vetting the quality of answers and ideas becomes more complex when anyone in the company can contribute. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Fuzzy expert system modeling of laser processing by Subramonian, Sivarao, Ahmad, Kamely, Md Palil, Md Dan

    Published 2009
    “…The objective of the paper is: to design knowledge based rules, algorithm, architecture & learning ability to develop fuzzy surface roughness predictive model for laser machining; to develop fuzzy predictive model using design parameters which were critically analyzed; to make a comparative study of the observed and modelled surface roughness output of 5mm Mn-Mo pressure vessel plate. …”
    Get full text
    Get full text
    Article
  13. 13

    Intelligent material handling mobile robot for industrial purpose with active force control capability by Mailah, Musa, Jamaluddin, Hishamuddin, Pitowarno, Endra, Purnomo, Didik Setyo

    Published 2005
    “…An integrated kinematic and dynamic control with embedded intelligent algorithms were the main approaches employed for the robust motion control of a mobile manipulator (MM) comprising a differentially driven wheeled mobile base platform with a two-link planar arm mounted on top of the platform. …”
    Get full text
    Get full text
    Monograph
  14. 14

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…The thesis presents the design, necessary data structures, algorithms and implementation details of JLOG. The results of comparing the performance of JLOG to regular PROLOG and Tabled PROLOG systems are also presented.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Government policy as a key moderator to contractors’ risk attitudes among Malaysian construction companies by Taofeeq, D. M., Adeleke, A. Q., Lee, Chia Kuang

    Published 2020
    “…They play the most important roles in implementing construction projects, and their activities have a significant impact on their risk attitudes during the execution of projects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article