Search Results - (( java implementation modified algorithm ) OR ( management implementation max algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. by Naghshbandi, Danial, Subramaniam, Shamala, Moghadam, Saeed Rahimi

    Published 2013
    “…To strike an ideal balance in gauging these trade-offs and to further complement the repository of simulators, this paper presents the details of a general-purpose programming language based discrete event simulation for WiMAX. This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
    Get full text
    Get full text
    Article
  3. 3

    Digital beamforming implementation of switch-beam smart antenna system by using integrated digital signal processor and field-programmable gate array by Vakilian, Vida

    Published 2008
    “…After modeling, the algorithm is implemented in DSP. By using the Hardware- In-Loop facility of DSP, the comparison between hardware implementation and software modeling is performed. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Effective downlink resource management for wimax networks by Shareef, Zayd Ashraf Najeeb

    Published 2018
    “…Herein, we propose a downlink communication framework called Effective Downlink Resource Management (EDRM) in WiMAX Internet infrastructure networks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-criteria strategy for job scheduling and resource load balancing in cloud computing environment by Aminu Abdulkadir, Mahmoud, M. Zarina, ., Wan Nor Shuhadah, Wan Nik, Fadhilah, Ahmad

    Published 2015
    “…In the first phase the shortest job completion time is measured based on the completion time of three techniques i.e. min-min, max-min and suffrage. Meanwhile in the second phase genetic algorithm is implemented for resource load balancing. …”
    Get full text
    Get full text
    Article
  8. 8

    Multi-criteria strategy for job scheduling and resource load balancing in cloud computing environment (Article) by Zarina, Mohamad, Wan Nor Shuhadah, Wan Nik, Fadhilah, Ahmad

    Published 2015
    “…In the first phase the shortest job completion time is measured based on the completion time of three techniques i.e. min-min, max-min and suffrage. Meanwhile in the second phase genetic algorithm is implemented for resource load balancing. …”
    Get full text
    Get full text
    Article
  9. 9

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Ahmad Salihin, Samsudin, Amir Izzani, Mohamed, Mohd Mawardi, Saari

    Published 2025
    “…A comprehensive data preprocessing pipeline was implemented, including missing value treatment, outlier removal, and feature normalization using Min-Max scaling. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Antenna design using left-handed materials by Abd. Rahman, Tharek, Abdolee, Reza

    Published 2008
    “…After modeling, the algorithm is implemented in DSP by using C and Code Composer Studio. …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    A host mobility support with adaptive network selection method in hybrid wireless environment by Heidarinezhad, Mohammad Reza, Ahmad Zukarnain, Zuriati, Udzir, Nur Izura, Othman, Mohamed

    Published 2009
    “…Implemented architecture is composed of four part; Connection Profile Manager (CPM), Net-work Access Assistance (NAA), Neuro-Fuzzy Decision Engine (NFDE), and Peer-bind Connection Manager (PCM). …”
    Get full text
    Get full text
    Article
  14. 14

    Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters by Abusalama, Jawad

    Published 2025
    “…These approaches were rigorously evaluated against Andrea’s algorithm and a Genetic Algorithm, revealing competitive advantages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Malaysian license plate recognition system using Convolutional Neural Network (CNN) on web application / Nur Farahana Mahmud by Mahmud, Nur Farahana

    Published 2022
    “…It is widely utilised in diverse applications, for example, access control and parking management. Nowadays, there are numerous license plate recognition systems that have been developed and analysed effectively by previous researchers using different machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Predicting Chlorophyll Intensity Of Various Plants Using Improved Convolutional Neural Network by Michelle, Nashrin Bawai

    Published 2023
    “…A convenient assessment of chlorophyll content is essential in smart management agriculture. Several attempts have been made to implements computer vision to enhance the precision agriculture techniques. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis