Search Results - (( java implementation modified algorithm ) OR ( knowledge using delay algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    RWP-NSGA II: reinforcement weighted probabilistic NSGA II for workload allocation in fog and internet of things environment by Ariffin, Ahmad Alauddin, Belhaouari, Samir Brahim, Raissouli, Hafsa

    Published 2024
    “…This method uses domain-specific knowledge to improve convergence and solution quality, resulting in reduced delay and better energy efficiency compared to traditional NSGA II and other evolutionary algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…This model was then simulated using the data collected to verify whether the model was operating effectively and can be used to achieve the objective of this research. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…This goes to the second objective of this research, in which to apply the algorithm to an App called “AR-Simulasi”, where it will be used to monitor the conveyor system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks by Latif, Suhaimi A, Masud, Mosharrof Hussain, Anwar, Farhat, Alam, Md Khorshed

    Published 2013
    “…In this regard,some critical issues like packet loss, packet reordering and delay need to be addressed efficiently. This paper aims to investigate the common scheduling algorithms both adaptive and non-adaptive solutions that have been using in networking and communication field. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Decision Support Approach to Computerize Maintenance Management System: Development and Implementation in Food Processing Industry by M.A., Burhanuddin, A.R., Ahmad, M.I., Desa, M.Y., Zeratul

    Published 2008
    “…In fact, these downtimes can be forecasted and managed more effectively if an organization takes preemptive measures using artificial intelligence techniques such as data mining, neural networks, genetic algorithm etc. …”
    Get full text
    Get full text
    Article
  13. 13

    Managing Fragmented Database Using BVAGQ-AR Replication Model by Ainul Azila, Che Fauzi, Noraziah, Ahmad, Tutut, Herawan, Z., Abdullah, Gupta, Ritu

    Published 2017
    “…Problem arises when the database is packed with data, but it has lacked of knowledge. If the unreasonable data is used in database replication, it will cause waste of data storage and delay the time taken for a replication process. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Cognitive benefits of employing multiple AI voices as specialist virtual tutors in a multimedia learning environment by Liew, Tze Wei, Tan, Su Mae, Chan, Tak Jie, Tian, Yang, Ahmad, Faizan

    Published 2025
    “…Cognitive load was measured via a survey, while learning outcomes were assessed using immediate and 2-week delayed posttests covering retention, near-transfer, and far-transfer tasks. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model by Noraziah, Ahmad, Wan Maseri, Wan Mohd, Ainul Azila, Che Fauzi

    Published 2015
    “…The problem is although we are packed with data, but we have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    BVAGQ-AR for Fragmented Database Replication Management by N., Ahmad, Ainul Azila, Che Fauzi, Sharifah Hafizah, Sy Ahmad Ubaidillah, Al-Kazemi, Basem, Odili, Julius Beneoluchi

    Published 2021
    “…Although we have been packed with data, we still have lacked of knowledge. Nevertheless, if the impractical data is used in database replication, this will cause waste of data storage and the time taken for a replication process will be delayed. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Implementing universal priority DBA algorithm in PIC based EPON testbed by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Majid M.S.A., Abdullah F.

    Published 2023
    “…To the best of our knowledge, this is the first time PIC is being used in EPON testbed for this purpose. …”
    Article
  19. 19

    Computerized Maintenance Management System for Food Processing Industries by M.A., Burhanuddin, A.R., Ahmad, M.I., Desa, M.Y., Zeratul

    Published 2007
    “…In fact, these downtimes can be forecasted and managed more effectively if an organization takes preemptive measures using artificial intelligence techniques such as data mining, neural networks, genetic algorithm etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20