Search Results - (( java implementation modified algorithm ) OR ( parameter content based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…Through the proposed algorithm, the Minimum Contention Window (CWmin) and Arbitration Inter Frame Space (AIFS) parameters were adapted based on the percentage of the collision in the network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…This research attempts to look into ways to produce an effective back-off mechanism that is adaptive dynamically to the network status and able to support QoS for realtime applications over wireless ad-hoc networks based on the IEEE 802.11e standard. The current research proposes a new algorithm so-called Dynamic Fast Adaptation of back-off algorithm for contention-based EDCA (DFA-EDCA) mechanism. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Video abstraction using density-based clustering algorithm by Chamasemani, Fereshteh Falah, Affendey, Lilly Suriani, Mustapha, Norwati, Khalid, Fatimah

    Published 2017
    “…The novelty of DbSva is (a) to integrate the advantages of both the global and local features of video contents by fusion and (b) to employ the DENsity-based CLUstEring algorithm (DENCLUE) to significantly improve the quality of abstract videos. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…In this study, a fully online density-based clustering algorithm called Buffer-based Online Clustering for Evolving Data Stream (BOCEDS) is presented. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A matlab-based graphical user interface (GUI) to predict the food quality during frying process by Siti Nabihah, Othman

    Published 2022
    “…The colour and moisture content were evaluated based on two parameters of French fries, which were oil temperature (150℃,170℃ and 190℃) and sample thickness (5mm,10mm and 15mm) during deep frying. …”
    Get full text
    Thesis
  13. 13

    Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e by Anuar, Ammar

    Published 2016
    “…Enhanced Distributed Channel Access (EDCA) is a fundamental and mandatory contention-based channel access method of IEEE 802.11e which delivers traffic based on differentiated Access Category (ACs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…The performance of FESSIC was evaluated against ten benchmark image classification algorithms and six classifiers on four ground-based sky image datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    An efficient backoff algorithm for IEEE 802.15.4 wireless sensor networks by Dahham, Zahraa, Sali, Aduwati, Mohd Ali, Borhanuddin

    Published 2014
    “…EBA-15.4MAC is designed based on two new techniques; firstly, it updates the contention window size based on the probability of collision parameter. …”
    Get full text
    Get full text
    Article
  17. 17

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
    Get full text
    Thesis
  18. 18

    Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks by Qadawi, Zahraa D.A.

    Published 2013
    “…EBA-15.4MAC is based on two new important techniques; firstly, it updates he contention window size based on the probability of collision parameter. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E by Oad, Aneel

    Published 2013
    “…The acquired results have proven that the proposed algorithms have successfully enhanced the legacy hybrid and the deadline based algorithm.…”
    Get full text
    Get full text
    Thesis
  20. 20