Search Results - (( java implementation modified algorithm ) OR ( using box study algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys by Nejad, Farshid Hossein, Sabah, Saman, Jam, Amid Jamshidi

    Published 2014
    “…Static S-Box allows attackers to study S-Box and discover weak issues while by using dynamic S-Box approach, it makes difficult and more complex for attacker to do any offline study of an attack of one particular set of S- boxes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Hybrid ant colony optimization algorithm for container loading problem by Yap, Ching Nei

    Published 2012
    “…The TB heuristic placed the base box on the container floor and packed the boxes on the base box by stacking them one by one until the container is full, whereas other researchers used the stack building heuristic to generate a set of box towers from all of the given boxes then only arranged them into the container. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH by Siti Roslindar, Yaziz, Roslinazairimah, Zakaria

    Published 2018
    “…This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder by Lim, Alice Pei San

    Published 2021
    “…This study aims to develop a stress optimisation model using harmony search (HS) algorithm to control and limit cracks in the concrete. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…In conclusion, this proposed block cipher can also be used as a secure algorithm by nations, organisations or stakeholders to improve data protection besides contributing to computer security research as an alternative to other cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Box-jenkins and genetic algorithm hybrid model for electricity forecasting system by Mahpol, Khairil Asmani

    Published 2005
    “…Time Series method has always been used in a variety of forecasting applications. In this thesis, an approach that combines the Box-Jenkins methodology for SARIMA model and Genetic Algorithm (GA) will been introduced as a new approach in making a forecast. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation by Lateh, Masitah bdul

    Published 2020
    “…Hence, the aims of this study are proposing an algorithm of hybrid to generate artificial samples adopts Small Johnson Data Transformation and Box-Whisker Plot which is introduced in previous studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2021
    “…This paper studied on the effectiveness of visual analytics techniques to identify the appropriate technique to be instantiated to the machine learning algorithm to further elaborate the results obtained by demonstrating transparency, interpreta- bility and explainability of the machine learning algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Superpixel Sizes using Topology Preserved Regular Superpixel Algorithm and their Impacts on Interactive Segmentation by Goh, Kok Luong, Chai, Soo See, Ng, Giap Weng, Muzaffar Hamzah

    Published 2022
    “…Based on our findings, an image with 1000 to 2500 superpixels and a combination of bounding box and strokes will help the interactive segmentation algorithm produce a good segmentation result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Superpixel Sizes using Topology Preserved Regular Superpixel Algorithm and their Impacts on Interactive Segmentation by Kok Luong, Goh, Soo See, Chai, Giap Weng, Ng, Muzaffar, Hamzah

    Published 2022
    “…Based on our findings, an image with 1000 to 2500 superpixels and a combination of bounding box and strokes will help the interactive segmentation algorithm produce a good segmentation result. …”
    Get full text
    Get full text
    Get full text
    Article