Search Results - (( java implementation modified algorithm ) OR ( using consequences using algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Optimization of fuzzy model using genetic algorithm for process control application by Yusof, Rubiyah, Abdul Rahman, Ribhan Zafira, Khalid, Marzuki, Ibrahim, Mohd Faisal

    Published 2011
    “…This paper discusses the identification of the parameters at the antecedent and consequent parts of the fuzzy model. For the antecedent fuzzy parameters, genetic algorithm is used to tune them while at the consequent part, recursive least squares approach is used to identify the system parameters. …”
    Get full text
    Get full text
    Article
  7. 7

    On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models by Tay, Kai Mei, Chee, Peng Lim

    Published 2009
    “…This can be accomplished with the use of a search algorithm, such as the brute force, genetic algorithm or etc…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms by Qayyum, Abdul, Malik, Aamir Saeed, Mohamad Saad, Mohamad Naufal, Iqbal, Mahboob, Abdullah, Mohd Faris, Rasheed, Waqas, Tuan Abdullah, Tuan Ab Rashid, Ramli, A Q

    Published 2015
    “…We have compared the results of Pleiades satellite stereo images using dynamic programming and Graph-Cut algorithms, consequently comparing satellites’ imaging sensors and Depth-estimation Algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
    Get full text
    Get full text
    Article
  10. 10

    Multi-state PSO GSA for solving discrete combinatorial optimization problems by Ismail, Ibrahim

    Published 2016
    “…These four algorithms can be used to solve discrete combinatorial optimization problems (COPs). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fault diagnostic algorithm for precut fractionation column by Heng, H. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2004
    “…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin by Zainal Abidin, Ainna Naeemah

    Published 2019
    “…Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…Then, the data is cluster by using K Means to produce labeled input that will be trained by using Gradient Boosting Machine, a decision tree algorithm to make prediction. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Recursive least square and fuzzy modelling using genetic algorithm for process control application by Abdul Rahman, Ribhan Zafira, Yusof, Rubiyah, Khalid, Marzuki

    Published 2007
    “…A technique for the modelling of nonlinear process control using Recursive Least Square and Takagi-Sugeno Fuzzy System with Genetic Algorithm topology is described. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Spam image filtering algorithm / Muhammad Hazim Shahimi by Shahimi, Muhammad Hazim

    Published 2015
    “…It has shown that the proposed algorithm is good in classifying the images. There are some improvements that can be suggested for future works such as use more data, apply the better OCR technique, use another image feature extraction, and use another classifier.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Testing and validation of a Β; algorithm for cubesat satellites by Bottcher, M., Eshghi, S., Varatharajoo, Renuganth

    Published 2016
    “…For most satellite missions, it is essential to decrease the satellite angular velocity. The Β algorithm is a common algorithm to stabilize the spacecraft by using magnetorquers. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…The proposed algorithm was able to avoid the use of parameter important degree, decision partition and finding the multiple of the universe within the sets. …”
    Get full text
    Get full text
    Get full text
    Thesis