Search Results - (( java implementation modified algorithm ) OR ( towards implementation using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah by Wan Ngah, Wan Ahmad Jailani

    Published 2013
    “…It uses obstacle border as guidance toward the target and at the same time uses sensors to implement obstacle avoidance. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…The running servers can be shut down and save the energy used. In the benchmark paper, the result of implementation of LACE algorithm in 400, 600, 800 and 1000 servers were plotted at different graphs. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Evolutionary Multiobjective optimization for automatic generation Of Neural game controller by Chin, Kim On, Yong, Yung Nan

    Published 2013
    “…This research presents the result of implementing evolutionary algorithms towards computational intelligence in Tower Defense game (TD game). …”
    Get full text
    Get full text
    Research Report
  9. 9
  10. 10
  11. 11

    Implementation of swarm intelligence algorithms on mobile robots by Kong, Zhung Jie

    Published 2017
    “…This thesis focusses on the implementation of swarm intelligence algorithms on multiple mobile robots. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Autonomous path planning robot using geographical information by Ismail Ishaq Ibrahim

    Published 2008
    “…After the simulation using Matlab, the algorithm will then be implemented in the robot using basic stamp to run the mobile robot. …”
    Get full text
    Learning Object
  14. 14

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…In future, the test toward the strength of this enhanced AES-\ 28 bit algorithm should be conducted.…”
    Get full text
    Get full text
    Thesis
  17. 17

    A Study Of Salting Method for Image Protection by Ahmad Faeez bin Lukman

    Published 2013
    “…The general purpose of using this method is mainly because it provides the best type of security towards images, by implementing the method on the passwords used to gain access to the image stored in the database. …”
    Other
  18. 18

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…This thesis work studied on digital image encryption algorithms performed towards JPEG images. With image encryption algorithms, JPEG images can be securely scrambled or encrypted prior to distribution. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
    Get full text
    Get full text
    Get full text
    Article