Search Results - (( java implementation modified algorithm ) OR ( program identification method algorithm ))
Search alternatives:
- implementation modified »
- identification method »
- java implementation »
- method algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
7
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…This research has produced filtered back concentration profiles of each flow regimes owing to the technique of neural network method of flow regime identification.…”
Get full text
Get full text
Thesis -
8
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
9
Simultaneous Network Reconfiguration and DG Sizing Using Evolutionary Programming and Genetic Algorithm to Minimize Power Losses
Published 2014“…This paper presents an effective method based on Evolutionary Programming (EP) and Genetic Algorithm (GA) to identify the switching operation plan for feeder reconfiguration and distributed generation size simultaneously. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Besides that, a constrained non-linear programming method for FIS modelling is suggested, as a variant of the system identification method.…”
Get full text
Get full text
Get full text
Article -
12
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). The simulation results reveal that the proposed methods demonstrate a high success rate of fault-location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Article -
13
-
14
Biometrics: Facial Recognition
Published 2004“…It also lists the various approaches in handling facial recognition where we see different methods applied and opinions on which method is better and what factors influenced them. …”
Get full text
Get full text
Final Year Project -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Fault location identification in power transmission networks using novel non-intrusive fault monitoring systems
Published 2020“…To examine and validate the proposed methodology for constructing power transmission networks, various fault types are simulated by using electromagnetic transients program (EMTP). The simulation results are achieved to reveal that the proposed methods demonstrate a high success rate of fault location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…After that, a hybrid of MLFNN with other optimization methods was introduced, i.e. Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
Get full text
Get full text
Thesis -
20
Detecting cholesterol presence using iris recognition algorithm
Published 2010Get full text
Working Paper
