Search Results - (( java implementation modified algorithm ) OR ( user evaluation study algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- evaluation study »
- user evaluation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Tag clouds algorithm with the inclusion of personality traits
Published 2015“…In addition, a prototype was developed to evaluate the proposed algorithm. Then, user satisfaction was conducted in order to evaluate this prototype using Q-SAFI instruments. …”
Get full text
Get full text
Get full text
Thesis -
6
Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor
Published 2019“…Evaluation for this study is to evaluate the of reliability result of recommendation engine by using the approach algorithm. …”
Get full text
Get full text
Thesis -
7
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
8
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
9
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
10
Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review
Published 2025“…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
15
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
16
A comparative study of interactive segmentation with different number of strokes on complex images
Published 2020“…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
Get full text
Get full text
Get full text
Article -
17
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
Get full text
Get full text
Article -
18
A study on personalized recommender system using social media
Published 2020“…These machine learning algorithm processes the data set obtained. The evaluation on these algorithm is done to evaluate accuracy of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A Comparative Study of Interactive Segmentation with Different Number of Strokes on Complex Images
Published 2020“…Therefore, the input from the user as well as the understanding of the algorithms based on the user input has an essential role in the success of interactive segmentation. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. …”
Get full text
Get full text
Get full text
Article
