Search Results - (( java implementation modified algorithm ) OR ( policy implementation method algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A hybrid model of system dynamics and genetic algorithm to increase crude palm oil production in Malaysia by Mohd Zabid, M. Faeid

    Published 2018
    “…The hybrid of SD-GA through phase optimization process is capable to recommend policies that are plausible to be implemented to avoid unwarranted shock to the industry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation by Turgut, Mert Sinan, Turgut, Oguz Emrah, Afan, Haitham Abdulmohsin, El-Shafie, Ahmed

    Published 2019
    “…In addition, two different optimization algorithms, namely crow search algorithm and master–slave algorithm, have been introduced to generate an optimal rule for water release policy. …”
    Get full text
    Get full text
    Article
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Poverty risk prediction based on socioeconomic factors using machine learning approach by Mohd Zawari, Nur Farhana Adibah

    Published 2025
    “…Although the research is limited with respect to its sample size and geographical scope, it has provided important findings that can be used when implementing data-driven methods in social policy formulation and poverty mitigation strategies.…”
    Get full text
    Get full text
    Student Project
  14. 14

    A multi-objective routing mechanism for energy management optimization in SDN multi-control architecture by Ibrahim, Abeer A. Z., Hashim, Fazirulhisyam, Sali, Aduwati, Noordin, Nor K., Fadul, Saber M. E.

    Published 2022
    “…This paper proposed and implemented an energy-aware routing multi-level and mapping problem (EARMLP) algorithm to minimize the overall power consumption in Software-Defined Networking (SDN)-based core networks. …”
    Get full text
    Get full text
    Article
  15. 15

    Emotion recognition and analysis of netizens based on micro-blog during covid-19 epidemic by Jiao, BianBian, Leelavathi, R., Lohgheswary, N., Nopiah, Z. M.

    Published 2022
    “…It will be of great significance for the introduction and implementation of national policies.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Existence and uniqueness for the evolutionary impulse control problem using an asynchronous algorithms by Haiour M., Bencheikh Le Hocine M.E.A., Jan R., Himadan A., Boulaaras S.

    Published 2025
    “…Ensuring both the existence and uniqueness of optimal control policies in such settings is paramount for practical implementation and theoretical understanding. …”
    Article
  20. 20

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…The mammogram database's initial test segment is critical for evaluating performance and determining the Area Under the Curve (AUC) to alias with medical policy. In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis