Search Results - (( java implementation modified algorithm ) OR ( point modeling using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- point modeling »
- modeling using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Development of committee machine models for multiple response optimization problems
Published 2014“…Four methodologies are to make four different CM models to solve MRO problems. The fifth methodology proposes the final algorithm which uses four CM models together to solve MRO problems. …”
Get full text
Get full text
Thesis -
8
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…The algorithm for this learning model adopted the reward-modulated STDP. …”
Get full text
Get full text
Monograph -
9
Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm
Published 2013“…Boost dc-dc converter is used with maximum power point tracking algorithm to operate at desired voltage level. …”
Get full text
Get full text
Thesis -
10
Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan
Published 2022“…This descriptive-analytical was resolved using the formulation of the study such as point addition, point doubling and double-and-add algorithm. …”
Get full text
Get full text
Student Project -
11
Comparison Of Crossover In Genetic Algorithm For Discrete-Time System Identification
Published 2021“…Genetic algorithm (GA), a method known for optimisation is used for selecting a model structure. …”
Get full text
Get full text
Get full text
Article -
12
Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud
Published 2017“…All ten access point model used in the experiment are currently supplied by TM to the customers.…”
Get full text
Get full text
Thesis -
13
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item -
14
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…At first, the pre-segmentation algorithm uses a modified dominant point detection algorithm to mark a minimal number of points which defines the text skeleton. …”
Get full text
Get full text
Article -
15
Evaluating the effectiveness of integrated benders decomposition algorithm and epsilon constraint method for multi-objective facility location problem under demand uncertainty
Published 2017“…In order to evaluate the proposed algorithm, some performance metrics including the number of Pareto points, mean ideal points, and maximum spread are used, then the t-test analysis is done which points out that there is a significant difference between aforementioned algorithms.…”
Get full text
Get full text
Get full text
Article -
16
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
17
An Algorithmic Approach for Stability of an Autonomous System
Published 2002“…An example of such a system is the prey-predator model. To interpret the results we have to obtain full information on the system of equations such as the stability of the equilibrium points of the system. …”
Get full text
Get full text
Thesis -
18
Control of Maximum Power Point Tracking for Stand-Alone Photovoltaic System Using Voltage Comparison Technique
Published 2013“…This paper proposed the other method to control of maximum power point tracker for stand- alone photovoltaic system using closed-loop voltage mode control algorithm. …”
Get full text
Get full text
Article -
19
Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm
Published 2010“…A DC-DC boost converter is chosen to step up the input DC voltage of the PV module while the perturb and observe maximum power point algorithm is used and modeled to ensure the power stabilization is made. …”
Get full text
Get full text
Conference or Workshop Item -
20
Object Localization In 3D Point Cloud
Published 2020“…The results of object localization are often affected by many factors such as the quality of the point clouds and the sensitivity of the algorithms to the occlusion in the point clouds. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
