Search Results - (( java implementation modified algorithm ) OR ( using competency based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…Managing employee’s competency is considered as the top challenge for human resource professional especially in the process to determine the right person for the right job that is based on their competency.As an alternative approach, this article attempts to propose academic leadership bio-inspired classification model using negative selection algorithm to handle this issue.This study consists of three phases; data preparation, model development and model analysis. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…Recently, the swarm-based hybrid algorithms have given significant performance in cancer classification. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm by Yifan, Bai, Kamarudin, Khairul Manami, Alli, Hassan

    Published 2024
    “…This research explores the Pareto-primarily based Genetic Algorithm (PGA) inside this framework, with the goal of fostering innovation in product layout and the generation of novel ideas. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Fuzzy adaptive emperor penguin optimizer for global optimization problems by Md Abdul, Kader

    Published 2023
    “…The Emperor Penguin Optimizer (EPO) is a recently developed population-based metaheuristic algorithm that simulates the huddling behaviour of emperor penguins. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Determination of the best single imputation algorithm for missing rainfall data treatment by Gamil Abdulraqeb Abdullah Saeed, Chuan, Zun Liang, Roslinazairimah Zakaria, Wan Nur Syahidah Wan Yusoff, Mohd Zuki Salleh

    Published 2016
    “…The presence of missing rainfall data is inevitable due to error of recording, meteorological extremes and malfunction of instruments. Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Determination of the Best Single Imputation Algorithm for Missing Rainfall Data Treatment by Saeed, Gamil Abdulraqeb Abdullah, Chuan, Zun Liang, Roslinazairimah, Zakaria, Wan Nur Syahidah, Wan Yusoff

    Published 2016
    “…The presence of missing rainfall data is inevitable due to error of recording, meteorological extremes and malfunction of instruments. Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling by Anuar, Nurul Izah

    Published 2022
    “…It is also discovered that the hybrid-discrete MOPSO (HD-MOPSO) algorithm manages to obtain higher values in the performance metrics consisting of non-dominance ratio and hypervolume compared to the competing algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Latin hypercube sampling Jaya algorithm based strategy for T-way test suite generation by Nasser, Abdullah B., Abdul-Qawy, Antar S. H., Abdullah, Nibras, Hujainah, Fadhl, Kamal Z., Zamli, Ghanem, Waheed A. H. M.

    Published 2020
    “…Jaya Algorithm (JA) is a new metaheuristic algorithm, has been used for solving different problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    A novel clustering algorithm for mobile ad hoc networks based on determination of virtual links’ weight to increase network stability by Karimi, Abbas, Afsharfarnia, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2014
    “…In order to improve the stability of clusters, weight-based clustering algorithms are utilized. However, these algorithms only use limited features of the nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Cutpoint determination methods in competing risks subdistribution model by Noor Akma Ibrahim, Abdul Kudus, Isa Daud, Mohd. Rizam Abu Bakar

    Published 2009
    “…Five cutpoint determination methods are developed based on regression of competing risks subdistribution. …”
    Get full text
    Get full text
    Article
  20. 20

    Cutpoint determination methods in competing risks subdistribution model by Ibrahim, Noor Akma, Kudus, Abdul, Daud, Isa, Abu Bakar, Mohd Rizam

    Published 2009
    “…Five cutpoint determination methods are developed based on regression of competing risks subdistribution. …”
    Get full text
    Get full text
    Get full text
    Article