Search Results - (( java implementation modified algorithm ) OR ( program mass method algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modelling of Adsorption of Dyes from Aqueous Solution by Activated Carbon by Wong, Teck Ngin

    Published 2004
    “…A computer program written in FORTRAN 90 is developed. The PDEs for the axial and radial directions are discretised into ODEs using OC method. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…Data captured for this purpose is in the range of mass flow rates 26 g/s to 204 g/s. A Visual C++ programming language is used to develop an application program to compute the image reconstruction algorithms and display the tomograms which represent the concentration profiles at a measurement crosssection of the pipe. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Detection of Microcalcification Using Mammograms by Md Hasan, Khairul Nisak

    Published 2004
    “…The morphological operation was a simple and suitablemethod in identifying the microcalcification. The top-hat algorithm method that is a morphological operation was developed using MATLAB and successfully obtained the output image that shows the candidate microcalcification. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    3D hand posture recognition using multicam by Mohd Nazrin , Muhammad, Nurdiana, Nordin

    Published 2011
    “…The availability of the distance data allows the hand posture to be recognized in z-axis direction without complex computational algorithms which also enables the program to work in real-time processing as well as eliminates the background effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Artificial neural network (ANN) modeling & validation to predict compression index of tropical soft soil by Yong, Shirley Xiao Wei

    Published 2010
    “…This study demonstrates the comparison between the conventional estimation of Cc by using Terzaghi’s settlement equation and the predicted Cc from ANN. Therefore, a programming was written by using MATLAB 6.5 and train with eight different training algorithm, namely Resilient Backpropagation (rp), Conjugate Gradient Polak-Ribiére algorithm (cgp), Scale Conjugate Gradient (scg), Levenberg-Marquardt algorithm (lm), BFGS Quasi-Newton (bfg), Conjugate Gradient with Powell/Beale Restarts (cgb), Fletcher-Powell Conjugate Gradient (cgf), and One-step Secant (oss) have been compared for the best prediction of Cc. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    SYSTEMATIC DESIGN ALGORITHM FOR ENERGY EFFICIENT AND COST EFFECTIVE HYDROGEN PRODUCTION FROM PALM WASTE by INAYAT, ABRAR

    Published 2012
    “…However, the existing design methods are limited to allow simultaneous and integrated assessment of process performance, heat efficiency and costs. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A matlab-based graphical user interface (GUI) to predict the food quality during frying process by Siti Nabihah, Othman

    Published 2022
    “…In this study, the colour and moisture content of French fries is studied during deep frying.The colour changes and moisture content were formulated by first order kinetic equation which was numerically solved by using the Runge Kutta fourth order method that was embedded with a parameter fitting technique called as Nelder-Mead algorithm in MATLAB software. …”
    Get full text
    Thesis
  16. 16

    Determination Of Bukit Merah Reservoir Capacity Using Sequential Peak Analysis by Azhani, Aidatul Aznuraini Aidil

    Published 2022
    “…The Sequent Peak Analysis is chosen because it is easy to program, suits with large data and considers evaporation losses compared to other methods which is Mass Curve Method. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…The semi-automated dental staging system developed in this study is based on the Malay children’s population and uses a brain-inspired learning algorithm termed "deep learning". The methodology is comprised of four major steps: image preprocessing, which adheres to the inclusion criteria for panoramic dental radiographs, segmentation, and classification of mandibular premolars according to Demirjian's staging system using the Dynamic Programming-Active Contour (DP-AC) method and Deep Convolutional Neural Network (DCNN), respectively, and statistical analysis. …”
    Get full text
    Get full text
    Thesis