Search Results - (( java implementation modified algorithm ) OR ( using factor needs algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…Past literatures showed that there are many factors that can be used to assess company’s performance but only a limited number of factors are needed to efficiently assess its performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography by Tian, Wenbin, Ramli, Mimi Faisyalini, Yang, Wuqiang, Sun, Jiangtao

    Published 2020
    “…The conclusions in this paper can be used for practical industrial processes, regarding the adaptive selection of relaxation factor and the number of iterations needed.…”
    Get full text
    Get full text
    Article
  9. 9

    Healthy Lifestyle Management System by Abu Bakar, Muhammad Syazwan

    Published 2011
    “…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…However, to fully utilize the algorithm, the parameter of the algorithm need to be set properly. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries by Fadzli, S.A., Abdulkadir, S.I., Makhtar, M., Jamal, A.A.

    Published 2016
    “…The algorithm needs to optimise other factors such as energy consumption and the degree of turns a robot need to take. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Impatient task mapping in elastic cloud using genetic algorithm by Mehdi, Nawfal A., Mamat, Ali, Ibrahim, Hamidah, K. Subramaniam, Shamala

    Published 2011
    “…Cloudsim simulator was used to test the proposed algorithm with real datasets collected as a cloud benchmark. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat by Yuliant, Sibaroni, Sri Suryani, Prasetiyowati, Iqbal Bahari, Sudrajat

    Published 2020
    “…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Optimization of chest X-ray exposure factors using machine learning algorithm by Hamd, Zuhal Y., Alrebdi, H.I., Osman, Eyas G., Awwad, Areej, Alnawwaf, Layan, Nashri, Nawal, Alfnekh, Rema, Khandaker, Mayeen Uddin *

    Published 2023
    “…In this study, the chest X-ray exposure factors for 178 patients with different body mass index (BMI) values have been analyzed using the Python Machine Learning algorithm. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Solving fuzzy-facilities layout problem using genetic algorithm by Purnomo, Muhammad Ridwan Andi, Mandiri, Amalia Ramadhana, Hassan, Azmi

    Published 2013
    “…Further, the obtained matrix is used for layout optimisation that conducted using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Selection of prospective workers using profile matching algorithm on crowdsourcing platform by Cucus, Ahmad, Aji, Luhur Bayu, Al Fahim, Mubarak Ali, Aminuddin, Afrig, Farida, Lilis Dwi

    Published 2022
    “…The criteria used to find a match between workers and the work offered consist of two parts, core factors and secondary factors. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item