Search Results - (( java implementation modified algorithm ) OR ( using evaluation between algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- evaluation between »
- between algorithm »
- using evaluation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The results of the algorithms were mathematically evaluated using the Relative Foreground Area Error. …”
Get full text
Get full text
Thesis -
8
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
Get full text
Get full text
Get full text
Thesis -
9
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The OPNET simulator and the mathematical model were used to evaluate the performance for the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
10
Evaluation of dynamic programming among the existing stereo matching algorithms
Published 2015“…On this research is to perform an evaluation on the performance between the dynamic programming with other existing method as comparison. …”
Get full text
Get full text
Get full text
Article -
11
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…Online algorithms are used in a variety of situations such as forex trading, cache replacement, and job scheduling etc. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
13
Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems
Published 2012“…The proposed algorithm, which is called Vector Evaluated Gravitational Search Algorithm (VEGSA), uses a number of populations of particles. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…For objective evaluation,visual difference predictor (VDP) was used to compare the difference between the HDR image and the tone mapped image. …”
Get full text
Get full text
Thesis -
15
Evaluation of robot path planning algorithms in global static environments: genetic algorithm vs ant colony optimization algorithm / Nohaidda Sariff and Norlida Buniyamin
Published 2010“…These nodes generally represent the free space extracted from the robot map. Performances between both algorithms were compared and evaluated in terms of speed and number of iterations that each algorithm takes to find an optimal path within several selected environments. …”
Get full text
Get full text
Get full text
Article -
16
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. …”
Get full text
Get full text
Article -
17
Performance evaluation of vector evaluated gravitational search algorithm II
Published 2014“…The VEGSAII algorithm uses a number of populations of particles. …”
Get full text
Get full text
Conference or Workshop Item -
18
Evaluation of feature selection algorithm for android malware detection
Published 2018“…This paper synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
Get full text
Article -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions
Published 2014“…The VEGSA algorithms use a number of populations of particles. …”
Get full text
Get full text
Get full text
Article
