Search Results - (( java implementation modified algorithm ) OR ( knowledge equalization based algorithm ))
Search alternatives:
- implementation modified »
- knowledge equalization »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
6
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Computer programming is the essential foundation for the other basic skills in Information Technology knowledge areas. Success in this field requires complex knowledge and skill. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…To the best knowledge of the researcher, blind equalisation based on QR factorization technique has been not used in MDM equalisation to date. …”
Get full text
Get full text
Get full text
Thesis -
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
10
Weblog search engine based on quality criteria
Published 2011Get full text
Get full text
Get full text
Article -
11
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
12
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
13
Performance analysis of bacterial genome assemblers using illumina next generation sequencing data / Nur ‘ Ain Mohd Ishak
Published 2020“…Results showed that on single-end data sets, MaSuRCA, and SPAdes produced generally the best results among all the four assemblers with highest percentage of contigs that were equal or longer than 500 bp, highest total base pairs, highest N50 and the lowest L50 for most assemblers. …”
Get full text
Get full text
Get full text
Thesis -
14
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Design/methodology/approach – The hypotheses of the study were tested using personally administered survey questionnaires; the study obtained 486 valid questionnaires, which were evaluated using SmartPLS Algorithm and bootstrapping functions. Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. …”
Get full text
Get full text
Get full text
Article -
15
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
16
A framework for automatic modelling of survival using fuzzy inference.
Published 2012“…In this framework, alternative methods of partitioning the input space can be selected to define the membership functions, for example by using expert knowledge, equalizer partitioning, fuzzy c-means clustering, or the combination of these techniques. …”
Get full text
Get full text
Conference or Workshop Item -
17
Machine Learning and Dyslexia-Diagnostic and Classification System (DCS) for Kids with Learning Disabilities
Published 2018“…Most experts are using manual techniques to diagnose dyslexia. Machine learning algorithms are capable enough to learn the knowledge of experts and intelligently diagnose and classify dyslexics. …”
Get full text
Get full text
Get full text
Article -
18
Review on computational strategies for bi-layered metal powder compaction
Published 2024“…A scrutinize part is the implementation of algorithm to describe powder behavior under double loading as well as to relate with other mechanical variables that eventually require expertise on computational plasticity knowledges involving horizontal contacts. …”
Get full text
Get full text
Get full text
Book Section -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
20
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…The Whale Optimisation Algorithm (WOA), Harris Hawks Optimisation (HHO) Algorithm, Lévy Flight WOA (LFWOA) and the Opposition-Based Learning of HHO (OBL-HHO) were proposed to simulate the initial model’s response and optimise the Klang Gate Dam (KGD) release operation with observed inflow, water level (storage), release, and evaporation rate (loss). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
