Search Results - (( java implementation modified algorithm ) OR ( making process generating algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article by Abdol Azis, Hazriq Syahmie

    Published 2010
    “…Considering to fitness values sensitivity in genetic algorithm process, there is needed to apply load flow for decision-making. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme by Arif, Mandangan, Kamarulhaili, Hailiza, Asbullah, Muhammad Asyraf

    Published 2021
    “…Instead of depending solely on the orthogonality-defect values, the proposed conditions could make the measurement of good and bad bases in the key generation algorithm of the GGH-MKA cryptosystem becomes clearer and deterministic.…”
    Get full text
    Get full text
    Article
  8. 8

    Incorporating energy generation process in environmental assessment of a biopharmaceutical process by Auni Hamimi, Idris

    Published 2015
    “…Therefore, this work aims to estimate the PET value from WFT and pure steam generation using a simple algorithm which is modified from Waste Reduction (WAR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  10. 10

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  11. 11

    HYBRID: an efficient unifying process to mine frequent itemsets by Zulkurnain, Nurul Fariza, Shah, Ahmad

    Published 2018
    “…In this paper, an efficient hybrid algorithm was designed using a unifying process of the algorithms Improved Apriori and FP-Growth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Optimization of multi-holes drilling path using particle swarm optimization by Najwa Wahida, Zainal Abidin

    Published 2022
    “…The performance of PSO was then compared with other meta-heuristic algorithms, including Genetic Algorithm (GA) and Ant Colony Optimisation (ACO), Whale Optimisation Algorithm (WOA), Ant Lion Optimiser (ALO), Dragonfly Algorithm (DA), Grasshopper Optimisation Algorithm (GOA), Moth Flame Optimisation (MFO) and Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…These devices continuously generate a massive amount of data on the network. The IoT (mobile) devices that generate these data are limited in terms of processing capacity and energy, because of these limitations of the mobile devices, they cannot process all generated tasks in the IoT application environment. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme by Arif Mandangan, Kamarulhaili, H., Asbullah, M. A.

    Published 2021
    “…Instead of depending solely on the orthogonality-defect values, the proposed conditions could make the measurement of good and bad bases in the key generation algorithm of the GGH-MKA cryptosystem becomes clearer and deterministic.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, Khan

    Published 2011
    “…decision making. Timely identification of newly emerging trends is needed in business process. …”
    Get full text
    Get full text
    Citation Index Journal
  17. 17

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
    Get full text
    Get full text
    Citation Index Journal
  18. 18

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A semi-apriori algorithm for discovering the frequent itemsets by Fageeri, S.O., Ahmad, R., Baharudin, B.B.

    Published 2014
    “…Mining the frequent itemsets are still one of the data mining research challenges. Frequent itemsets generation produce extremely large numbers of generated itemsets that make the algorithms inefficient. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Combinatorial test suites generation strategy utilizing the whale optimization algorithm by Ali Abdullah, Hassan, Salwani, Abdullah, Kamal Zuhairi, Zamli, Rozilawati, Razali

    Published 2020
    “…Supporting the No Free Lunch theorem, as well as potentially offering new insights into the whole process of t-way generation, this article proposes a new strategy with constraint support based on the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article