Search Results - (( java implementation modified algorithm ) OR ( program information source algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…This work includes the use of structure information contained in source code programs to automate program classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Source code classification using latent semantic indexing with structural and frequency term weighting by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…In recent years, there is an increase in the number of open source software.Hence, the demand for automatic software classification is also increasing.Latent Semantic Indexing (LSI) is an information retrieval approach that is utilized in classifying source code programs. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…University Utara Malaysia, just like any other universities, also have to face this problem. Among Information Technology graduates, Java programming assignments is an essential part of learning programming as it trains the student to solve programming assignments so that they can improve their programming skills that is useful in their professional life after graduation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Classification of machine learning engines using latent semantic indexing by Yusof, Yuhanis, Alhersh, Taha, Mahmuddin, Massudi, Mohamed Din, Aniza

    Published 2012
    “…Functional descriptors of each program are identified by extracting terms contained in the source code.In addition, information on where the terms are extracted from is also incorporated in the LSI.Based on the undertaken experiment, the LSI classifier is noted to generate a higher precision and recall compared to the C4.5 algorithm as provided in the Weka tool.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Parallelization Of CCSDS Hyperspectral Image Compression Using C++ by Tan, Lit Chez

    Published 2018
    “…In this research, the aim is to design a parallelization algorithm on CCSDS-MHC using Open Multi-Processing (OpenMP), an open-source C++ application programming interface (API). …”
    Get full text
    Get full text
    Monograph
  14. 14
  15. 15

    Backward reduction application for minimizing wind power scenarios in stochastic programming by Muhamad Razali N.M., Hashim A.H.

    Published 2023
    “…In order to make informed decisions in the presence of uncertainties, risk management problems of power utilities may be modelled by multistage stochastic programs. …”
    Conference Paper
  16. 16

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Determining the graduates employability using data analytics model by Matos Jr., Zenon A.

    Published 2023
    “…These studies used a data analytics model to forecast the employability of graduates using the linear regression algorithm and the SMOreg algorithm, predict the number of graduates in the next 3 years in the BS Information Technology program, and determine the percentage of graduates who are employed and unemployed using the data sourced from the tracer study conducted. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…This paper highlights the data retrieval method for mining software from a vast open source software repository, SourceForge. For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…This paper highlights the data retrieval method for mining software from a vast open source software repository, SourceForge. For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. …”
    Get full text
    Get full text
    Get full text
    Article