Search Results - (( java implementation modified algorithm ) OR ( using electronics sub algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using electronics »
- electronics sub »
- sub algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Design Of Perturbative Hyper-Heuristics For Combinatorial Optimisation
Published 2019Get full text
Get full text
Thesis -
7
-
8
-
9
An algorithm for navigation of mobile robots in cluttered environments
Published 2013Get full text
Get full text
Article -
10
-
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each four sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Thesis -
12
New approach of cryptography algorithm for e- mail applications
Published 2005“…The second step is to apply the hash method on this message by using shuffle mechanism. Now the message is ready to do the encryption process that is dividing the text message to 128 8-bit for each eight sub keys, so if the text message less than 128 8-bit then use another sub key. …”
Get full text
Get full text
Conference or Workshop Item -
13
VHDL implementation of DES algorithm / Emmanvel Kajan Mering
Published 2004Get full text
Get full text
Thesis -
14
-
15
Optimal input features selection of wavelet-based EEG signals using GA
Published 2004Get full text
Conference or Workshop Item -
16
Predictions of isolate and normal pentene of debutanizer catalytic reforming unit by using artificial neural network
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015Get full text
Get full text
Book Chapter -
18
-
19
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
