Search Results - (( java implementation modified algorithm ) OR ( using consequences using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using consequences »
- consequences using »
- using algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Optimization of fuzzy model using genetic algorithm for process control application
Published 2011“…This paper discusses the identification of the parameters at the antecedent and consequent parts of the fuzzy model. For the antecedent fuzzy parameters, genetic algorithm is used to tune them while at the consequent part, recursive least squares approach is used to identify the system parameters. …”
Get full text
Get full text
Article -
7
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
Published 2009“…This can be accomplished with the use of a search algorithm, such as the brute force, genetic algorithm or etc…”
Get full text
Get full text
Get full text
Article -
8
Vegetation height estimation near power transmission poles via satellite stereo images using 3D depth estimation algorithms
Published 2015“…We have compared the results of Pleiades satellite stereo images using dynamic programming and Graph-Cut algorithms, consequently comparing satellites’ imaging sensors and Depth-estimation Algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
9
Hazard identification on fractionation column using rule based expert system
Published 2001“…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
Get full text
Get full text
Article -
10
Multi-state PSO GSA for solving discrete combinatorial optimization problems
Published 2016“…These four algorithms can be used to solve discrete combinatorial optimization problems (COPs). …”
Get full text
Get full text
Thesis -
11
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
12
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. …”
Get full text
Get full text
Thesis -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
14
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…Then, the data is cluster by using K Means to produce labeled input that will be trained by using Gradient Boosting Machine, a decision tree algorithm to make prediction. …”
Get full text
Get full text
Final Year Project -
17
Recursive least square and fuzzy modelling using genetic algorithm for process control application
Published 2007“…A technique for the modelling of nonlinear process control using Recursive Least Square and Takagi-Sugeno Fuzzy System with Genetic Algorithm topology is described. …”
Get full text
Get full text
Conference or Workshop Item -
18
Spam image filtering algorithm / Muhammad Hazim Shahimi
Published 2015“…It has shown that the proposed algorithm is good in classifying the images. There are some improvements that can be suggested for future works such as use more data, apply the better OCR technique, use another image feature extraction, and use another classifier.…”
Get full text
Get full text
Thesis -
19
Testing and validation of a Β; algorithm for cubesat satellites
Published 2016“…For most satellite missions, it is essential to decrease the satellite angular velocity. The Β algorithm is a common algorithm to stabilize the spacecraft by using magnetorquers. …”
Get full text
Get full text
Get full text
Article -
20
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…The proposed algorithm was able to avoid the use of parameter important degree, decision partition and finding the multiple of the universe within the sets. …”
Get full text
Get full text
Get full text
Thesis
