Search Results - (( java implementation modified algorithm ) OR ( strategic implementation using algorithm ))*

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2015
    “…Exploitation and exploration mechanisms are the main components in metaheuristics algorithms. These mechanisms are implemented explicitly in ant colony system algorithm.The rate between the exploitation and exploration mechanisms is controlled using a parameter set by the users of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effects of strategic leadership, organizational innovativeness, information technology capability on effective strategy implementation by Palladan, Ahmad Aliyu

    Published 2017
    “…Partial Least Squares Method (PLS 2) algorithm and bootstrap techniques were used to test the study hypotheses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis by Mukhlis, Siti Farah Najwa

    Published 2017
    “…Therefore many research have been done to develop this type of computer game by using the Al techniques. In Dam Haji game, the goal is to find the optimal movement to make, so A* algorithm, which is a pathfinding algorithm is used. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…This indicates that the algorithm was able to produce a good model. The extraction algorithm developed showed that influencial factors produced could be used as guideline for companies to monitor and strategize ways for business improvement.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Advances in metaheuristics: Applications in engineering systems by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…It also includes discussions on the potential improvement of algorithmic characteristics via strategic algorithmic enhancements. …”
    Get full text
    Get full text
    Book
  14. 14

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…Main contribution of ERP ALAR include user-centered, cheap, rugged and improved network access system through the following inputs: 3D implementation that takes care of landscape structures such as mountains and hills which is a common phenomenon in rural regions; extension of the current network coverage reach through the use of wireless relays; strategic deployment plan for the rural population through phase-by-phase deployment; cheap and affordable hardware implementation to minimize overall investment cost; and use of rugged WiFi hardware (IEEE 802.11 b) to minimize attention required on maintenance. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Harris Hawk Optimization-Based Deep Neural Networks Architecture for Optimal Bidding in the Electricity Market by Kavita Jain, Muhammed Basheer Jasser, Muzaffar Hamzah, Akash Saxena, Ali Wagdy Mohamed

    Published 2022
    “…The state-of-the-art frameworks used for simulating strategic bidding decisions in deregulated electricity markets (EM’s) in this article are bi-level optimization and neural networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…Gateway placement optimization is implemented to strategically placing the IoT gateways, aiming to fulfil different technical requirements on top of minimizing the number of gateway. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Towards Wind Energy-based Charging Stations: A Review of Optimization Methods by Alhasan A.M.W., Umar D.A., Alkawsi G., Alkahtani A.A., Alomari M.A., Aris H.

    Published 2024
    “…Researchers engage diverse strategies and methodologies in the realm of sizing and optimization, encompassing a spectrum of algorithmic implementations and software solutions. …”
    Article
  20. 20