Search Results - (( java implementation modified algorithm ) OR ( program program drops algorithm ))

Refine Results
  1. 1
  2. 2

    Intelligent examination timetabling system using hybrid intelligent water drops algorithm by AlDeeb, Bashar A., Md Norwawi, Norita, Al-Betar, Mohammed A., Jali, Mohd Z.

    Published 2015
    “…This paper proposes Hybrid Intelligent Water Drops (HIWD) algorithm to solve Tamhidi programs uncapacitated examination timetabling problem in Universiti Sains Islamic Malaysia (USIM).Intelligent Water Drops algorithm (IWD) is a population-based algorithm where each drop represents a solution and the sharing between the drops during the search lead to better drops.The results of this study prove that the proposed algorithm can produce a high quality examination timetable in shorter time in comparison with the manual timetable.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  7. 7

    OPTIMAL CABLE SELECTION IN RADIAL DISTRIBUTION NETWORKS CONSIDERING PLANNER'S DEFINED VOLTAGE DROP LIMIT by Ab Ghani, Mohd Ruddin

    Published 2002
    “…By using this proposed computer algorithm and program an example is solved successfully that is presented in the results.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub... by Md. Som, Ayub

    Published 2014
    “…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…This thesis presents an investigation of using the Intelligent Water Drops (IWD) algorithm to construct and produce good quality solutions for the UETP. …”
    thesis::doctoral thesis
  12. 12
  13. 13

    ECONOMICAL OPTIMIZATION OF CONDUCTOR SELECTION IN PLANNING RADIAL DISTRIBUTION NETWORKS by Ab Ghani, Mohd Ruddin

    Published 1999
    “…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Economical optimization of conductor selection in planning radial distribution networks by Islam, S.J., Ghani, M.R.A.

    Published 1999
    “…A new computer algorithm and program is presented for selection of optimal conductor type and size for each feeder segment. …”
    Get full text
    Get full text
    Article
  15. 15

    Simulation of single and dual layered rapid pressure swing adsorption by Lai, Yin Ling

    Published 2013
    “…It is also found that the oxygen product purity increases by almost 20% when the first layer is packed with Zeolite AgLiX and Zeolite 5A in the second layer. Higher pressure drop across the bed is induced when particles of smaller pressure drop are used in the first layer and particles of larger pressure drop are used in the second layer, hence leading to better separation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimized topology control in mobile IP networks using a new parametric routing algorithm by Gholizadeh, Somayyeh, Abdullah, Azizol, Othman, Mohamed, Mohd Hanapi, Zurina

    Published 2018
    “…For this purpose, an Optimal Parametric Topology Control Routing (OPTCR) algorithm is introduced based on parametric linear programming formulation (LPF). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…The password system is also recommended as a viable solution for this authentication as its implementation is most convenient for mobile users. A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
    Get full text
    Get full text
    Thesis
  20. 20