Search Results - (( java implementation modified algorithm ) OR ( using codes machine algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  4. 4

    Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application by Mat Seman., Norhidayah

    Published 2019
    “…The interpreter functions to extract and interpret the x and y data positions from the generated G-code. The input of the interpreter is the G-code generated from a standard three-dimensional geometrical CAD/CAM part production using CATIA software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…These steps resulted in consistent enhancements of approximately 10.41% and 16.58% for milling and drilling machining, respectively. Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Distributed t-way test suite execution with code coverage on multiple machines by Zainal Hisham, Che Soh, Syahrul Afzal, Che Abdullah, Kamal Z., Zamli

    Published 2017
    “…The generated t-way test suite data and software under test (SUT) source code are preloaded into their respective partition using hash based routing algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text by Kasmuri, Emaliana

    Published 2023
    “…In the unified code-switching feature set, the extracted Malay and English features were unified using an adapted algorithm known as the Malay-English Unified POS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes by Mohammad Sigit Arifianto, Tze, Kenneth Kin Teo, Liau, Chung Fan, Liawas Barukang, Zaturrawiah Ali Omar

    Published 2007
    “…Secondly, the number of processors in use at each step of the parallel code (degree of parallelism) has an effect on the computation time and the communication time as well. …”
    Get full text
    Get full text
    Research Report
  16. 16

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm by Delgoshaei, Aidin, Beighizadeh, Razieh, Mohd Arffin, Mohd Khairol Anuar, Leman, Zulkiflle, Ali, Ahad

    Published 2022
    “…Then, a new method for using fuzzy weights of the factors used in the Support Vector Machine algorithm is proposed. …”
    Get full text
    Get full text
    Article
  19. 19

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…This research is about the design and simulation on enhancement network security using machine learning. The design use MATLAB coding to show the simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis