Search Results - (( java implementation modified algorithm ) OR ( using codes machine algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- machine algorithm »
- using codes »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
4
Integration Of G-Code With Position Controller Via Interpreter Design Using MATLAB For Milling Machine Application
Published 2019“…The interpreter functions to extract and interpret the x and y data positions from the generated G-code. The input of the interpreter is the G-code generated from a standard three-dimensional geometrical CAD/CAM part production using CATIA software. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Article -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…These steps resulted in consistent enhancements of approximately 10.41% and 16.58% for milling and drilling machining, respectively. Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Distributed t-way test suite execution with code coverage on multiple machines
Published 2017“…The generated t-way test suite data and software under test (SUT) source code are preloaded into their respective partition using hash based routing algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
Get full text
Get full text
Monograph -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text
Published 2023“…In the unified code-switching feature set, the extracted Malay and English features were unified using an adapted algorithm known as the Malay-English Unified POS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Secondly, the number of processors in use at each step of the parallel code (degree of parallelism) has an effect on the computation time and the communication time as well. …”
Get full text
Get full text
Research Report -
16
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). …”
Get full text
Get full text
Thesis -
17
-
18
Forecast innovative development level in green supply chains using a comprehensive fuzzy algorithm
Published 2022“…Then, a new method for using fuzzy weights of the factors used in the Support Vector Machine algorithm is proposed. …”
Get full text
Get full text
Article -
19
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
Get full text
Get full text
Thesis -
20
Enhancement of network security by use machine learning
Published 2019“…This research is about the design and simulation on enhancement network security using machine learning. The design use MATLAB coding to show the simulation. …”
Get full text
Get full text
Get full text
Get full text
Thesis
