Search Results - (( java implementation modified algorithm ) OR ( parameter data virtualization algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing hyperparameters of LSTM network models through genetic algorithm for virtual learning environment prediction by Ismanto, Edi, Ab Ghani, Hadhrami, Md Saleh, Nurul Izrin

    Published 2025
    “…Genetic algorithms for hyperparameter optimization significantly contributed, with the GA + LSTM + ADAGRAD model achieving 88% and 87% accuracy in the 7th and 9th models for BBB course data. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The MAC algorithm was developed in MATLAB environment and was applied on virtual sinogram which directly computed through forward projection of CT images. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Modeling of cupping suction system based on system identification method by Kavindran, Suresh

    Published 2022
    “…Cupping suction plant identification utilizing a nonlinear model based on the modified Sine Cosine Algorithm (mSCA). Moreover, there is a tool in MATLAB called System Identification Toolbox that can help to collect real measurement data samples. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Evolutionary tuning of modular fuzzy controller for two-wheeled wheelchair by Ahmad, Salmiah, Siddique, Nazmul H., Tokhi, Mohammad Osman

    Published 2012
    “…General rules of thumb allow heuristic tuning (trial and error) of the parameters but such heuristic method does not guarantee that the system tuned with current data set will represent future system states. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…The ACO algorithm in the Bluetooth M-LPNWSN system reduces energy consumption by 60% over 500 iterations and significantly improves data delivery rates by adapting dynamically to network topology and traffic. …”
    Get full text
    Get full text
    Get full text
    Thesis