Search Results - (( java implementation modified algorithm ) OR ( using combination based algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- combination based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
6
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
7
Predictive-reactive job shop scheduling for flexible production systems with the combination of optimization and simulation based algorithm
Published 2020“…The predictive part determines the feasible schedule to be used for a flow shop which is generated using a combination of rule-based simulation and optimization: first, using the optimization algorithm to compute a rough plan, followed by using a rule based simulation system to locally fine tune the plan to obtain the final schedule. …”
Get full text
Get full text
Get full text
Article -
8
Combining data mining algorithm and object-based image analysis for detailed urban mapping of hyperspectral images
Published 2014“…The images were used to explore the combined performance of a data mining (DM) algorithm and object-based image analysis (OBIA). …”
Get full text
Get full text
Article -
9
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
11
-
12
An improved framework for content and link-based web spam detection: a combined approach
Published 2021“…The content-based web spam detection framework uses three proposed and two improved content-based algorithms for web spam detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Optimizing BOINC scheduling using genetic algorithm based on thermal profile
Published 2014“…We use genetic algorithm to find the best combination of clients and jobs based on clients order and least execution time. …”
Get full text
Get full text
Conference or Workshop Item -
14
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…Firstly, a new strategy based on a combined method (i.e. single-objective Gravitational Search (GSA) with Bat Algorithm (BAT) (SOGS-BAT)) algorithm is proposed in which relies on the closed interval between 0 and 1 to avoid falling into local search. …”
Get full text
Get full text
Thesis -
15
Committee neural networks with fuzzy genetic algorithm.
Published 2011“…A bi-linear allocation lifetime approach is used to label the chromosomes based on their fitness value, which will then be used to characterize the diversity of the population. …”
Get full text
Get full text
Get full text
Article -
16
An algorithm to enhance elliptic curves scalar multiplication combining MBNR with point halving
Published 2010“…Elliptic curve point-halving algorithm proposed in [10], later double-base (DB) chain [3], and step multi-base representation (SMBR) [17] are among the ef- ficient techniques used in this field. …”
Get full text
Get full text
Get full text
Article -
17
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014Get full text
Conference or Workshop Item -
18
WCBP: A new water cycle based back propagation algorithm for data classification
Published 2016“…Therefore, this paper proposed the use of WC algorithm in combination with Back-Propagation neural network (BPNN) algorithm to solve the local minima problem in gradient descent trajectory. …”
Get full text
Get full text
Article -
19
Achieving security by combining Huffman and SLSB algorithms
Published 2013“…THE NEW ALGORITHM refers to a combined stenographic techniques; mainly Huffman algorithm and SLSB algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Activity recognition based on accelerometer sensor using combinational classifiers
Published 2015Get full text
Get full text
Conference or Workshop Item
