Search Results - (( java implementation modified algorithm ) OR ( system implementation cell algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…In a volatile manufacturing system, implementation of a CMS might not be applicable. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy logic – genetic algorithm based maximum power point tracking in photovoltaic system by Tukeman, Zalifah

    Published 2012
    “…The FLC designed and the implementation of photovoltaic model using Matlab/Simulink software package which can representative of PV cell module. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Indoor global path planning based on critical cells using dijkstra algorithm by Azrul Amri, Jamal, Engku Fadzli Hasan, Syed Abdullah, Fatma Susilawati, Mohamad

    Published 2015
    “…Path planning has been implemented in various robotics systems, and the results checked. …”
    Get full text
    Get full text
    Article
  10. 10

    Diagnosis of eyesight using Improved Clonal Selection Algorithm (ICLONALG) / Nor Khirda Masri by Masri, Nor Khirda

    Published 2017
    “…Therefore, in order to provide the excellent eyesight’s problem care, it needs an intelligent diagnostic of the eyesight to detect the classification of eyesight diseases. This study aims to implement the classification algorithm using the Improved Clonal Selection Algorithm (ICLONALG) to classify the eyesight’s problems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani by Che Ani, Siti Sarah Aqilah

    Published 2021
    “…Hence, the main purpose of this study is to develop a model of classification for breast cancer cell prediction. This study implements a machine learning algorithm called Ant Colony Optimization (ACO) algorithm to develop an accurate classification model for predicting breast cancer cells. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Hybrid MPPT algorithm for mismatch photovoltaic panel application / Muhammad Iqbal Mohd Zakki by Mohd Zakki, Muhammad Iqbal

    Published 2019
    “…Closed-loop PID control system is implemented to optimize the control speed, and accuracy of the MPPT system, along with PSO-based auto-tuning algorithm dedicated for the PID controller to provide adaptability with diverse hardware setup. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Modelling Of A New Fully Hybrid Spectrum Sharing Approach Fifth Generation Cellular Operators by Attiah, Mothana Lafta

    Published 2020
    “…More precisely, the mmWave cell–carrier distribution strategy was implemented by setting up a tolerable distance among the mmWave cells (mCells) that operate at the same band (28 or 73 GHz) which are adopted in this work. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network by Tee Y.K., Tiong S.K., Johnny K.S.P., Yeoh E.C.

    Published 2023
    “…In this paper, support vector regression (SVR) has been implemented successfully to forecast next interval power consumption at Node B with different type of antenna system. …”
    Conference paper
  20. 20

    Cloudids: Cloud Intrusion Detection Model Inspired By Dendritic Cell Mechanism by Azuan Ahmad, Norbik Bashah Idris, Mohd Nazri Kama

    Published 2024
    “…The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment.…”
    Article