Search Results - (( java implementation modified algorithm ) OR ( programming usage generation algorithm ))
Search alternatives:
- implementation modified »
- generation algorithm »
- java implementation »
- programming usage »
- usage generation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
6
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
9
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Therefore, this study concludes that that Elitist Hybrid MBO-GA is a useful strategy for generating t-way test suite generation.…”
Get full text
Get full text
Thesis -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
Get full text
Get full text
Final Year Project -
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
13
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…Recent growth in Wireless Local Area Network (WLAN) usage has generated considerable interest in the establishment of the IEEE 802.11 WLAN standards. …”
Get full text
Get full text
Get full text
Article -
14
Hybridization solution of electrical energy demand response and forecasting program by using PSO-LSSVM technique
Published 2023“…The proposed formulation of the ETOU optimization achieves an energy cost savings of up to 7.57% (PSO) and 7.98% (PSO-LSSVM), and the proposed models are intended to lower the cost of electrical energy usage across all price ranges. The study's findings will assist manufacturers in transitioning to the ETOU tariff and contribute to the national DSM initiative program. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
Get full text
Conference or Workshop Item -
16
-
17
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…Learning about computer science not only helps students to create programs, applications or how to handle devices, but strengthens the practise of Computational Thinking (CT). …”
Get full text
Get full text
Get full text
Article -
18
Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems
Published 2021“…The results show that the femtocell user’s minimum energy efficiency by applying NOMA with power allocation method using Sequential Convex Programming and user pairing based on Greedy Algorithm (NOMA-SCP-GA) is higher by 38.22 %, 58.84 %, and 76.39 % compared to NOMA-DC, NOMA-FTPA, and OFDMA methods respectively. …”
Get full text
Get full text
Thesis -
19
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…The central part of this subject is described in terms of frameworks or algorithms that explains how to achieve better performance. …”
Get full text
Get full text
Thesis -
20
Sizing of battery energy storage system: A multi-objective optimization approach in DIgSILENT powerfactory
Published 2023“…In the paradigm of the increasing trend to prevent global warming, renewable energy sources applications integrated with battery energy storage system (BESS) are gaining attention for reducing the usage of fossil fuels in electrical power generation. …”
Get full text
Get full text
Get full text
Article
