Search Results - (( java implementation modified algorithm ) OR ( process implementation during algorithm ))
Search alternatives:
- implementation modified »
- process implementation »
- implementation during »
- java implementation »
- during algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
A simulation software for DNA computing algorithms implementation
Published 2010Get full text
Get full text
Get full text
Article -
8
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…This research uses Genetic Algorithms concept and technique to solve an optimization problem in shortage in supply-demand during festive season which is during Hari Raya Aidilfitri. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of Biological Sprouting Algorithm for NoC Fault Tolerance
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Zest Based Visualization for Requirements Negotiation
Published 2011“…We have formulated a conceptual diagram on which to base the design and development process of the groupware for implementing the Zest algorithm. …”
Get full text
Get full text
Article -
12
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
13
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…For the implementation aspect, software-driven media processing was studied. …”
Get full text
Get full text
Thesis -
14
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
A semi-synchronous label propagation algorithm with constraints for community detection in complex networks
Published 2017“…A similarity score, based on the Sørensen-Dice index, is implemented to detect the initial communities and for breaking ties during the propagation process. …”
Get full text
Get full text
Article -
16
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…Meanwhile, the effect of EIARS in reducing the number of checked rules during the authorization process is evaluated using a simulation technique. …”
Get full text
Get full text
Thesis -
17
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Moreover, algorithm visualization systems are also useful tools in algorithm engineering, particularly at several stages during the design, implementation, analysis, tuning, experimental evaluation, and presentation of the algorithms process. …”
Get full text
Get full text
Get full text
Article -
18
Implementation of Frequency Drift for Identification of Solar Radio Burst Type II
Published 2016“…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
Get full text
Get full text
Get full text
Article -
19
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…To reduce the test cases generated during testing process, combinatorial algorithms which consisting Hill Climbing algorithm and T Way Combination algorithm as described in twayGenerator (Kamal Zuhairi Zamli, 2007) have been studied and reviewed. …”
Get full text
Get full text
Undergraduates Project Papers -
20
The effects of compiler optimizations in face recognition system
Published 2009Get full text
Article
