Search Results - (( java implementation modified algorithm ) OR ( using extended using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
    Get full text
    Get full text
    Student Project
  7. 7

    Extended Bat Algorithm (EBA) as an improved searching optimization algorithm by Pebrianti, Dwi, Nurnajmin Qasrina, Ann, Luhur, Bayuaji, Nor Rul Hasma, Abdullah, Zainah, Md. Zain, Indra, Riyanto

    Published 2018
    “…This paper presents a new searching technique by using a new variant of Bat Algorithm (BA) known as Extended Bat Algorithm (EBA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    An Improvement on Extended Kalman Filter for Neural Network Training by Tsan, Ken Yim

    Published 2005
    “…This study explored the training of a neural network inference system using the extended Kalman filter (EKF) learning algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    On the sequences ri, si, ti ∈ ℤ related to extended Euclidean algorithm and continued fractions by Muhammad, Khairun Nisak, Kamarulhaili, Hailiza

    Published 2016
    “…The extended Euclidean Algorithm is a practical technique used in many cryptographic applications, where it computes the sequences ri, si, ti ∈ ℤ that always satisfy ri = si a+ tib. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Iterative Algorithm for extended mixed equilibrium problem by Ahmad, Rais, Rizvi, Haider Abbas, Kilicman, Adem

    Published 2016
    “…In this paper, we introduce and study an extended mixed equilibrium problem by using auxiliary principle technique. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Extended spatial decision tree algorithm for classifying hotspot occurrence by Sitanggang, Imas Sukaesih

    Published 2013
    “…Empirical results using the real spatial forest fires dataset demonstrate that the extended spatial ID3 algorithm has better performance in term of accuracy compared to the non-spatial methods. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…The semantic similarity measure algorithm is used to compute the similitude strength between the Gene Ontology terms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Fast multilayer color QR code decoder algorithm utilizing fuzzy technique by Badawi, Bakri, Mohd Aris, Teh Noranis, Mustapha, Norwati, Manshor, Noridayu

    Published 2020
    “…In this paper, we propose a fast multilayer color QR code decoder algorithm to decode an extended color QR code. The extended color QR code utilize color reference for the color recognition. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A semi greedy soft real-time multiprocessor scheduling algorithm by Alhussian, Hitham, Zakaria, Mohd Nordin, Hussin, Fawnizu Azmadi

    Published 2014
    “…Unlike the current algorithms which are known to be greedy, our proposed algorithm uses a semi-greedy criteria to schedule tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis