Search Results - (( java implementation modified algorithm ) OR ( using complex range algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…Distance Vector-Hop (DV-Hop) algorithm has become the focus of studies for range-free localization algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm by Addie Irawan, Hashim, Marni Azira, Markom, Abdul Hamid, Adom, Mohd Muslim Tan, E. S.

    Published 2017
    “…As conclusion, the simple flow of the algorithm is suitable to replace the complex and high computational algorithm and system.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Characterization of oil palm fruitlets using artificial neural network by Olukayode, Ojo Adedayo

    Published 2014
    “…The results also showed that contrary to the widely reported gap between the accuracy of the LM algorithm and other feed forward neural network training algorithms, the RP trained network performed as good as that of the LM algorithm for the range of data considered. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Adapting And Hybridising Harmony Search With Metaheuristic Components For University Course Timetabling by Al-Betar, Mohammed Azmi

    Published 2010
    “…The results were compared against 21 other methods using eleven de facto standard dataset of different sizes and complexity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…This method will detect whether the video has a high, medium or low motion movement and it will determine the suitable Macroblock size (MB) and search range (p) for it. By using the hybrid method, it shows that the high motion video requires small MB size and larger search range to gain high encoded video quality while for the low motion video, larger MB size and small search range can be used to generate an acceptable video quality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods by Ng, Ing Kye

    Published 2014
    “…Second, Recognition Threshold is declared to diminish the noise of the motion. Third, the range which is defined as left or right is used for gesture recognition. …”
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Development of a Tuneable Test Problem Generator for Assembly Sequence Planning and Assembly Line Balancing by M. F. F., Ab Rashid, Hutabarat, Windo, Tiwari, Ashutosh

    Published 2012
    “…However, there is a scarcity in works that focus on developing problems to test these algorithms. In optimisation algorithm development, testing algorithms by a broad range of test problems is crucial to identify their strengths and weaknesses. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network by Gao, Yuan, Mohd Kasihmuddin, Mohd Shareduwan, Chen, Ju, Zheng, Chengfeng, Romli, Nurul Atiqah, Mansor, Mohd. Asyraf, Zamri, Nur Ezlin

    Published 2024
    “…It aimed to optimize the performance of G-type random high-order satisfiability logic structures embedded in Discrete Hopfield Neural Networks, thereby enhancing the efficiency of the Hopfield Neural Network learning algorithm. Through comparative analysis with other metaheuristic algorithms, our model demonstrated superior performance in terms of global convergence, time complexity, and algorithm complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient k-coverage scheduling algorithms for wireless sensor networks / Ahmed Abdullah Saleh Al-Shalabi by Saleh Al-Shalabi, Abdullah

    Published 2014
    “…The third demonstrated algorithm is a power aware k-coverage algorithm for WSNs with adjustable sensing range. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…Simulation results show that the new system has a wide hyperchaotic range with high complexity and sensitivity dependence. …”
    Get full text
    Get full text
    Thesis
  20. 20