Search Results - (( java implementation modified algorithm ) OR ( program from waste algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Performance analysis of support vector machine, Gaussian Process Regression, sequential quadratic programming algorithms in modeling hydrogen-rich syngas production from catalyzed co-gasification of biomass wastes from oil palm by Ayodele, B.V., Mustapa, S.I., Kanthasamy, R., Mohammad, N., AlTurki, A., Babu, T.S.

    Published 2022
    “…Taking advantage of the data generated from the process, this study explores the performance of twelve machine learning algorithms built on the support vector machine (SVM), the Gaussian process regression (GPR), and the non-linear response quadratic model (NLRQM) using Sequential quadratic programming, and the Levenberg-Marquardt algorithms. …”
    Get full text
    Get full text
    Article
  7. 7

    Performance analysis of support vector machine, Gaussian Process Regression, sequential quadratic programming algorithms in modeling hydrogen-rich syngas production from catalyzed co-gasification of biomass wastes from oil palm by Ayodele, B.V., Mustapa, S.I., Kanthasamy, R., Mohammad, N., AlTurki, A., Babu, T.S.

    Published 2022
    “…Taking advantage of the data generated from the process, this study explores the performance of twelve machine learning algorithms built on the support vector machine (SVM), the Gaussian process regression (GPR), and the non-linear response quadratic model (NLRQM) using Sequential quadratic programming, and the Levenberg-Marquardt algorithms. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Development of a fuzzy multi-objective mathematical model for hazardous waste location-routing problem by Hassani, Omid Boyer

    Published 2014
    “…This study considers uncertainty in generated hazardous waste quantity by using fuzzy parametric programming. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Integrated immune-commensal-evolutionary programming for economic dispatch and distributed generation installation / Mohd Helmi Mansor by Mansor, Mohd Helmi

    Published 2020
    “…ICEP is developed from the hybridization of three independent optimization techniques, namely Symbiotic Organisms Search (SOS), Artificial Immune System (AIS) and Evolutionary Programming (EP). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Shortest path from Bandar Tun Razak to Berjaya Times Square using Dijkstra Algorithm / Nur Syuhada Muhammat Pazil ... [et al.] by Muhammat Pazil, Nur Syuhada, Mahmud, Norwaziah, Jamaluddin, Siti Hafawati, Mustafa, Nur Farasyaqirra

    Published 2020
    “…The time of the shortest path problem and the cost problem are drawn separately. Moreover, Dijkstra algorithm is applied to find the shortest path. The shortest path is calculated by using C programming of Dev C++. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL by Hasbi, Ahmad Farhan

    Published 2007
    “…The development stages are comprised of structure and mechanism construction, electronic circuit development and programming algorithms generation. The tele-operated robot functions as a transporter. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Optimization technique with sensitivity analysis on menu scheduling for boarding school student aged 13-18 using “Sufahani-Ismail Algorithm” by M. Sudin,, Azila, Sufahani, Suliadi

    Published 2018
    “…Menu arranging is a known optimization problem. Therefore Binary Programming alongside optimization technique and “Sufahani-Ismail Algorithm” were utilized to take care of this issue. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20