Search Results - (( java implementation modified algorithm ) OR ( using _ based algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
7
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
9
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
Get full text
Get full text
Get full text
Book Chapter -
10
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…Before this, Sudoku generator has been develop using backtracking algorithm only, but this research use two algorithm which is recursive and backtracking algorithm that called as hybrid algorithm. …”
Get full text
Get full text
Thesis -
11
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
12
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
13
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…Lastly, for the fuzzy algorithm, a rule-based decision is applied to select whether the triangle area or average Euclidean algorithm is used to find the final estimated position. …”
Get full text
Get full text
Thesis -
14
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
15
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
Get full text
Get full text
Get full text
Article -
16
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
Get full text
Get full text
Get full text
Article -
17
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
Get full text
Get full text
Monograph -
18
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…Therefore, it is difficult for the users to find all the inter-related acts from the federal constitutional using manual method. In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
DC MOTOR CONTROL USING GENETIC ALGORITHM BASED PID
Published 2011“…This dissertation presents the research that had been done on the chosen topic, works done and results acquired throughout the Final Year Project for two semesters, about the DC Motor Control using Genetic Algorithm based PID. The objectives of this project are to optimize speed control of the DC motor by using Genetic Algorithm based PID, to improve the performances of the DC motor controller in term of rise time, settling time, maximum overshoot and Integral of Time Absolute Error (ITAE) and to decide the best parameters to be used for Genetic Algorithm that can optimize the performance of a DC Motor ( eg: population size, mutation rate and crossover value). …”
Get full text
Get full text
Final Year Project -
20
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…Moreover, experiments demonstrate that final clustering solution generated by the proposed incremental genetic-based clustering ensemble algorithm using the pattern ensemble learning method possess comparative or better clustering accuracy than clustering solutions generated by the incremental genetic-based clustering ensemble algorithms using other recombination operators. …”
Get full text
Get full text
Thesis
