Search Results - (( java implementation modified algorithm ) OR ( using expense using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A Comparative Study on three Component Selection Mechanisms for Hyper-Heuristics in Expensive Optimization by Jia Hui Ong, Jason Teo

    Published 2018
    “…As such, tailoring an algorithm to perform well in expensive optimization requires a lot of expertise and time. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A Comparative Analysis of Feature Extraction Algorithms for Augmented Reality Applications by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke

    Published 2021
    “…The performance of image matching algorithms that use expensive descriptors for detection and matching is addressed using existing approaches. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    A semi greedy soft real-time multiprocessor scheduling algorithm by Alhussian, Hitham, Zakaria, Mohd Nordin, Hussin, Fawnizu Azmadi

    Published 2014
    “…Unlike the current algorithms which are known to be greedy, our proposed algorithm uses a semi-greedy criteria to schedule tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Current trends strategies in the test redundancy reduction by Norasyikin, Safieny, Kamal Z., Zamli, Hasneeza, L. Zakaria

    Published 2016
    “…To enhance the performance by using a metaheuristic algorithm, we are proposing our work with adopts the sequence permutation and hybridization strategies.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Modification of particle swarm optimization algorithm for optimization of discrete values by Mohd Yassin, Ahmad Ihsan, Jusoh, Muhammad Huzaimy, Abdul Rahman, Farah Yasmin

    Published 2011
    “…We propose a novel modification to the PSO algorithm to perform rapid discrete optimization. The proposed Discrete-PSO method (DPSO) uses a rescaling equation to convert the continuous-valued positions into discrete-valued variables. …”
    Get full text
    Get full text
    Research Reports
  12. 12
  13. 13

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Fast algorithm for VQ-based wavelet coding system by Khalifa, Othman Omran

    Published 2003
    “…In this paper, a modified version of (Linde-Buzo-Gray)LBG algorithm using Partial Search Partial Distortion (PSPD) is presented for coding the wavelet coefficients. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…As VG uses all nodes (vertices) in the environments, it is computationally expensive. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Sizing optimization of standalone photovoltaic system with hydrogen energy storage using squirrel search algorithm / Aizat Shazni Ahmad Umar by Ahmad Umar, Aizat Shazni

    Published 2023
    “…Furthermore, when multiple models of system components must be included in the design, sizing becomes computationally expensive. As a result, optimization techniques are widely used in the sizing algorithms for such systems in order to achieve optimal results. …”
    Get full text
    Get full text
    Thesis
  18. 18

    AN ENSEMBLE APPROACH OF METAHEURISTIC ALGORITHMS WITH PARABOLIC APPROXIMATION TO OPTIMIZE WELL PLACEMENT PROBLEM by ISLAM, JAHEDUL

    Published 2021
    “…Hence, in this thesis, the concept of the parabolic approximation-based ensemble algorithm is utilized to tackle the computationally expensive multimodal well placement optimization problem.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Integrating genetic algorithms and fuzzy c-means for anomaly detection by Chimphlee, Witcha, Abdullah, Abdul Hanan, Sap, Noor Md., Chimphlee, Siriporn, Srinoy, Surat

    Published 2005
    “…The amount of available network audit data instances is usually large; human labeling is tedious, time-consuming, and expensive. Traditional anomaly detection algorithms require a set of purely normal data from which they train their model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A semi greedy soft real-time multiprocessor scheduling algorithm by Alhussian, H., Zakaria, N., Hussin, F.A., Bahbouh, H.T.

    Published 2014
    “…Unlike the current algorithms which are known to be greedy, our proposed algorithm uses a semi-greedy criteria to schedule tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item