Search Results - (( java implementation modified algorithm ) OR ( programming ability effectiveness algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences by UiTM, Faculty of Computer And Mathematical Sciences

    Published 2023
    “…Students will be assessed through written assessments as well as programing assignments. In the end they are expected to develop the ability to analyze simple problems, organize effective algorithmic solutions for the problems and write computer programs to solve them.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…The results obtained from the voltage stability analysis using FVSI were utilized to predict system violation, identify most sensitive line corresponds to a load bus and estimate the maximum load ability and operating margin in the system. A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An artificial bee colony-based double layered neural network approach for solving quadratic Bi-level programming problems by Watada, J., Roy, A., Wang, B., Tan, S.C., Xu, B.

    Published 2020
    “…In the current work, we devised a hybrid method involving a Double-Layer Neural Network (DLNN) for solving a quadratic Bi-Level Programming Problem (BLPP). For an efficient and effective solution of such problems, the proposed potential methodology includes an improved Artificial Bee Colony (ABC) algorithm, a Hopfield Network (HN), and a Boltzmann Machine (BM). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancing programming language learning with 3D game-based programming for MSU students: codadventure / Abdullah Adib Aditia Wirawan and Nur Suhana Mohd Redzo by Aditia Wirawan, Abdullah Adib, Mohd Redzo, Nur Suhana

    Published 2024
    “…Utilizing data analysis and student feedback allows for significant insights into the effects of the 3D game-based method on the adoption of programming languages. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Speed control of separately excited dc motor using artificial intelligent approach by Bernard, Albinus

    Published 2013
    “…The effectiveness of the proposed method is verified by develop simulation model in MATLAB-Simulink program. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…Various network topologies are simulated in order to investigate the effects of implementing this program on a network for various network performance parameters. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Small signal oscillatory instability control of power system using posicast controller and evolutionary programming by Mirfendereski, Shojaeddin

    Published 2014
    “…Two methods of optimization which are Evolutionary Programming (EP) and Genetic Algorithm (GA) were used to find the best value of the K and their comparative study were analyzed. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…Therefore, MTS is developed from TS with some additional features such as systematic neighbourhood evaluation procedure to reach the near optimal solutions quickly. The ability of MTS approach to exploit and explore the solution space effectively with adaptive memory property makes it more suitable to be used in UTSP. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…The Machine Learning Method is utilized for this task, which gives the computer the ability to learn. Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    I-ROOMBA by MOHAMED RASELI, MOHD AZWAN

    Published 2011
    “…The needs to find the correct algorithm to cover whole surface is very important. …”
    Get full text
    Get full text
    Final Year Project
  20. 20