Search Results - (( java implementation modified algorithm ) OR ( using code growth algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN by Maarif, Haris Al Qodri, Gunawan, Teddy Surya

    Published 2011
    “…The streaming simulation has also been performed using the SVEF simulator. The simulation result shows the proposed fast mode decision algorithm provides time saving up to 45 % while maintaining video quality with negligible PSNR loss. …”
    Get full text
    Get full text
    Book
  7. 7

    Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2) by Thian, Laah Lean, Al-Saegh, Ali Mohammed, Ramli, K. F., Ibrahim, N. S., Sali, Aduwati, Salman, Mustafa Ismael

    Published 2013
    “…Furthermore, EEF outperforms RR by 264% concerning the useful transmitted bits when QPSK modulation scheme with different coding rates is used.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An FPGA implementation of Alamouti's transmit diversity technique by Mukilan, Pushpamalar

    Published 2008
    “…They are particularly attractive because they do not require any additional transmission bandwidth, and unlike traditional systems use multipath interference to their benefit. However, there are limits to growth, and the radio spectrum used for wireless communications is a finite resource. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Computational study of cobalt oxide: Nanoparticles, surfaces and thin films supported on metal oxide surfaces / Ala’ Omar Hasan Zayed by Ala’ Omar , Hasan Zayed

    Published 2018
    “…In this study, investigation of the structural, energetic, electronic, and magnetic properties of several forms of cobalt oxides as clusters, films and surfaces had been carried out. Besides using our genetic algorithm code called Universal Genetic Algorithm (UGA) combined with DFT calculations to find the global and local energy minimum structures of (CoO)n (n = 3 − 7) clusters, we have also extended the search space to (CoO)nq (n = 3−10, q = 0, +1) clusters by another code of ours, the Modified Basin-Hopping Monte Carlo Algorithm (MBHMC) program, accompanied by accurate DFT calculations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Recent advances of whale optimization algorithm, its versions and applications by Alyasseri Z.A.A., Ali N.S., Al-Betar M.A., Makhadmeh S.N., Jamil N., Awadallah M.A., Braik M., Mirjalili S.

    Published 2024
    “…The successful applications of WOA are summarized. The open-source codes of the WOA code are given to build a wealthy WOA review. …”
    Book chapter
  13. 13
  14. 14

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Three-Description Scalar And Lattice Vector Quantization Techniques For Efficient Data Transmission by Teo, Hui Ting

    Published 2015
    “…As this thesis suggests a new labeling algorithm that uses lattice 4 for three description MDC system. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems by Salman, Mustafa Ismael

    Published 2015
    “…The continuous growth in wireless communication demands has led to a rapid increase in energy consumption and spectrum utilization. …”
    Get full text
    Get full text
    Thesis
  18. 18

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Characterizing Current Features of Malicious Threats on Websites by Wan Nurulsafawati, Wan Manan, Ahmed, Abdulghani Ali, M. N. M., Kahar

    Published 2019
    “…They compromised computer system, targeting especially to government sector, ecommerce and banking networks rigorously and made it difficult to detect the perpetrators. Attackers used a powerful technique, by embedding a malicious code in a normal webpage that resulted harder detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri by Mohd Asri, Nuha Bakizah

    Published 2021
    “…Encryption and decryption are used for image-based authentication here. Encode is mainly achieved by changing the message into other code that any third-party will not understand, one with the database of the user and one with the database of the server. …”
    Get full text
    Get full text
    Student Project