Search Results - (( java implementation modified algorithm ) OR ( programming using solid algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques by Ahmed Sabit, Hakilo

    Published 2006
    “…The process flow data is captured fitting an array of 16 such sensors around the circumference of the pipe to capture the inherent charge on the flowing solid materials. A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SOLID-STATE MP3 PLAYER by Abdul Rahman, Mohd Faizul Fatan

    Published 2005
    “…The topic for the Final Year Research Project (FYP) is "Solid-State MP3 Player". A solid-state memory is introduced here to replace the existing compact disc that is used to store data. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Solid/gas concentration measurements using multiple fan beam optical tomography by Abdul Rahim, R., Leong, L.C, Chan, K.S., Fazalul Rahiman, M. H., Fang, J.F.

    Published 2008
    “…The data obtained from optical fibre sensors will then be reconstructed into image using the Linear Back Projection and Iterative Reconstruction algorithms through Visual C++ programming. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Hence, Method 1 is not suitable to be used with the MBIST for System on Chip (SoC). For Method 2, suitable solid DBs are used to provide higher fault coverage instead of using the existing MTA. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem by Ismail, Zuhaimy, Nurhadi, Irhamah, Zainuddin, Zaitul Marlizawati

    Published 2008
    “…Based on the proposed heuristic method, we developed a program to optimize the routing problem using the Visual Studio C++ 6.0 programming language.…”
    Get full text
    Get full text
    Monograph
  11. 11

    INDOOR LOCATION SENSING USING RADIO FREQUENCY NETWORK by Tan, Douglas

    Published 2007
    “…The flowchart for the main program and hence, the programming of the calculations algorithm has been done and tested using user simulated digital control input. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…The software development involves data acquisition system, sensor modeling, image algorithms, and programming for a tomographic display to provide solids flow information in pipeline such as concentration and velocity profiles. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Implementation of multiple fan beam projection technique in optical fibre process tomography by Leong, Lai Chen

    Published 2005
    “…Concentration measurements from the reconstructed images are then used to obtain the mass flow rate of the solid/gas flow in a gravity flow rig. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A case study of minimising travel time for waste management problem with limited picking capacity in Taman Seremban 3 / Nur Yasmin Izzatul Zaid, Norezwannim Ibrahim and Nur Umairah... by Zaid, Nur Yasmin Izzatul, Ibrahim, Norezwannim, Zainol Hamizi, Nur Umairah

    Published 2024
    “…Second, the study will describe the model using Dijkstra's algorithm and software. Third, the model will be implemented in this study by doing data analysis using Dijkstra's method, which will be done using both math operations and software. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of an open-source and low-cost robotic arm based on STM32 microcontroller for promoting STEM education by Mohd Asri, Fatin Atirah, Ayob, Mohammad Afif, Rohaziat, Nurasyeera, Rahman, Hisyam Abdul, Rahman, Khairul Azlan A., Ayob, Mohd Erdi

    Published 2023
    “…This study aims to promote STEM education by describing the development of a free, open-source robot joint with three degrees of freedom (DOF). The control algorithm for a 3D-printed MK2 robot arm was programmed with an STM32 microcontroller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20