Search Results - (( java implementation modified algorithm ) OR ( using asms using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Numerical simulation of fluid flow in three dimensional domain based on two stage pressure-velocity correction method by Sabir, O., Ya, T.M.Y.S.T.

    Published 2015
    “…A second correction step is added to the pressure value and the velocity vectors using Simplified Marker and Cell method (SMAC). This new scheme is applied on staggered grid using implicit finite difference methods in order to achieve second order accuracy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Numerical simulation of fluid flow in three dimensional domain based on two stage pressure-velocity correction method by Sabir, O., Ya, T.M.Y.S.T.

    Published 2015
    “…A second correction step is added to the pressure value and the velocity vectors using Simplified Marker and Cell method (SMAC). This new scheme is applied on staggered grid using implicit finite difference methods in order to achieve second order accuracy. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Computer aided interactive pressure vessel design by Teoh, Sun Jie

    Published 2008
    “…The system applied formulae from ASME VIII-1 design code and the finite element analysis is using software ALGOR V16. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18
  19. 19
  20. 20

    Application of deep learning technique to predict downhole pressure differential in eccentric annulus of ultra-deep well by Krishna, S., Ridha, S., Ilyas, S.U., Campbell, S., Bhan, U., Bataee, M.

    Published 2021
    “…The data generated from this model, field data, and experimental data are used to train and test the FFBP-DNN networks. The network is developed used Kerasâ��s deep learning framework. …”
    Get full text
    Get full text
    Conference or Workshop Item