Search Results - (( java implementation modified algorithm ) OR ( using _ study algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…The algorithms were implemented in a Java environment. Results were discussed and analyzed by using formulas and were compared in percentages. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
6
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
9
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…This study aims to use Wavelet Transform Algorithm for image compression. …”
Get full text
Get full text
Get full text
Thesis -
10
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…Students then used TRAKLA2to learn five different types of algorithms. …”
Get full text
Get full text
Get full text
Article -
11
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
Get full text
Get full text
Thesis -
12
Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm)
Published 2017“…Many researchers are implements the page quality using the advanced searching algorithm. To make a good of the average page quality of the Malaysia statute federal constitutional are important for success this study. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
14
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…Both algorithms are compared. Simulation is used as a method in this study. …”
Get full text
Get full text
Get full text
Thesis -
15
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Analysis of Dijkstra’s and A* algorithm to find the shortest path
Published 2015“…There are so many algorithms used to find the shortest path such as Dijkstra, A* algorithm, Genetic algorithm, Floyd algorithm and Ant algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…This research concerns a study of stemming algorithm for Malay words begin with alphabet 'M'. …”
Get full text
Get full text
Thesis -
18
AGENT MEETING SCHEDULER
Published 2011“…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
Get full text
Get full text
Final Year Project -
19
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…This project studies and explores the potential of using Genetic Algorithm to solve Transcendental Equation. …”
Get full text
Get full text
Thesis -
20
Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman
Published 2012“…Based on the initial study, the Backtracking algorithm has been chosen as the most suitable algorithm to be used to develop the jigsaw puzzle according to available time and complexity of the algorithm. …”
Get full text
Get full text
Thesis
