Search Results - (( java implementation modified algorithm ) OR ( programming model force algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- force algorithm »
- model force »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Modeling and optimization of cold extrusion process by using response surface methodology and metaheuristic approaches
Published 2018“…The established extrusion force model was then taken as the fitness function. …”
Get full text
Get full text
Article -
6
Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems
Published 2001“…It involves the development of new programs and modifications of an existing simulation program. …”
Get full text
Get full text
Thesis -
7
Development of finite element model for soil-structure interaction
Published 2014“…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
Get full text
Get full text
Thesis -
8
Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale
Published 2021“…The application aims to develop a machine learning program using the algorithm of Support Vector Machine or Gaussian Process Regression to successfully predict the contact angle. …”
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive constitutive analytical model code for rubber bearings with load-dependent variable analytical model in seismically isolated steel structures
Published 2026“…The integration of these experimental results with the adaptive programming framework facilitated the development of a Variable Analytical Model (VAM) for the rubber bearings, which was compared against a conventional Constant Analytical Model (CAM) representing traditional modeling practices. …”
Get full text
Get full text
Get full text
Article -
10
Classification models for higher learning scholarship award decisions
Published 2018“…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. Five algorithms were employed to develop a classification model in determining the award of the scholarship, namely J48, SVM, NB, ANN and RT algorithms. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Numerical simulation of hybrid composite tubes under oblique compression
Published 2017“…Epoxy-reinforced fibers are wrapped around the steel tubes and it is then modeled numerically using the ANSYS finite element program. …”
Get full text
Get full text
Get full text
Article -
14
Numerical investigation of vortex-induced vibrations of a flexible riser with staggered buoyancy elements
Published 2020“…The obtained hydrodynamic force coefficient database can be also applied to other empirical VIV prediction programs. …”
Get full text
Get full text
Article -
15
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
16
Design and Development of a Vision System Interface for Three Degree of Freedom Agricultural Robot
Published 1999“…This differential system represents the dynamic model, which describes relationships between robot motion and forces causing that motion. …”
Get full text
Get full text
Thesis -
17
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. …”
Get full text
Get full text
Thesis -
18
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…A program with a running algorithm of a computer model is called a computer simulation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Human evacuation movement simulation model: Concepts and techniques
Published 2022“…A program with a running algorithm of a computer model is called a computer simulation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…There are many research has been done on security of file encryption with AES algorithm. There is no any successful attack yet against AES but because of a higher increasing of cybercrime it could be possible attack on it like brute force attack and algebraic attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
