Search Results - (( java implementation modified algorithm ) OR ( using a using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- using a »
- a using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…The main goal of this study is to obtain optimum results that satisfy the minimum completion time and achieve better utilization of resources, which lead to increased throughput. The algorithms were implemented in a Java environment. Results were discussed and analyzed by using formulas and were compared in percentages. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
7
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
9
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
10
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
11
Whole brain radiation therapy verification using 2D gamma analysis method
Published 2020“…A 3D conformal radiotherapy (CRT) of WBRT plans were constructed using both algorithms. …”
Get full text
Get full text
Thesis -
12
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…Firstly, the MF RPs database is reconstructed into a cluster database using the clustering algorithm. …”
Get full text
Get full text
Thesis -
13
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithms are a captivating use case for visualization. …”
Get full text
Get full text
Get full text
Article -
14
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…A fuzzy system is a rule-based system that uses human expert's knowledge which holds the truth or false values to make a particular decision. …”
Get full text
Get full text
Thesis -
15
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
16
Solving transcendental equation using genetic algorithm / Masitah Hambari
Published 2004“…For higher orders like Transcendental Equation, Numerical Methods is used to find the solutions. Genetic algorithm (GA) has long been used for optimization problems that arise in a wide variety of complex systems. …”
Get full text
Get full text
Thesis -
17
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
Published 2011“…In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). …”
Get full text
Get full text
Article -
18
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…The original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm presented here, and then the transformed image was encrypted using the Blowfish algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Schelkunoff array synthesis methods using adaptive-iterative algorithm
Published 2003“…Basically, this algorithm is a combination of iterative algorithm with adaptive algorithm. …”
Get full text
Get full text
Get full text
Thesis
