Search Results - (( java implementation modified algorithm ) OR ( using frequency using algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) by Mazlan, Nurul Hidayah

    Published 2019
    “…This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimization of load frequency control permancein two-area power system with PID controller using ICA and GSA algorithms / Mumuney Nurullahi Lekan by Mumuney Nurullahi , Lekan

    Published 2018
    “…Keywords: Load Frequency Control (LFC), Gravitational Search Algorithm (GSA), Imperialistic Competitive Algorithm (ICA), Tie-Line (T-L). …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A new algorithm to estimate attenuation using frequency shift methods by Maman Hermana, Hammad Hazim Mohd Azhar, Zuhar Zahir Tuan Harith

    Published 2012
    “…This paper presents the improvement of quality factor (Q) estimation using shift frequency method. A new method was developed based on two previous methods; peak frequency shift (PFS) method and centroid frequency shift (CFS) method. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design high frequency surgical robot controller: design FPGA-based controller for surgical robot manipulator simscape modeling by Taghizadegan, Ali, Piltan, Farzin, Sulaiman, Nasri B.

    Published 2016
    “…In HDL integral algorithm the minimum input arrival time before clock is 15.599 ns and the maximum frequency is 64.1 MHz, but in the best design action, the maximum frequency to design this single chip algorithm should be 178.190 MHz.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Urban transit frequency setting using Multiple Tabu Search with parameter control by Uvaraja, Vikneswary, Lee, Lai Soon

    Published 2019
    “…In this study, a Multiple Tabu Search (MTS) algorithm is employed to determine the bus frequency of the routes that minimize the number of buses, total waiting times and overcrowding simultaneously. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Refinement of Tuned Mass Damper parameters on machine support structure using dynamic Cuckoo Search algorithm by Ahmad Muinuddin, Mahmood, Zamri, Mohamed, Rosmazi, Rosli

    Published 2025
    “…The research aims to optimize key TMD parameters (mass ratio, damping ratio, and frequency ratio) using the dynamic CS algorithm. The performance of this algorithm will be evaluated by comparing it to the computed values in literature, especially from the Den Hartog formula. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Multiobjective optimization using weighted sum Artificial Bee Colony algorithm for Load Frequency Control by Naidu, K., Mokhlis, Hazlie, Bakar, Ab Halim Abu

    Published 2014
    “…This paper uses the weighted sum approach of the ABC to optimize the PID controller’s gains to provide a compromise between the frequency response’s settling time and maximum overshoot. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Secure routing using frequency hopping in wireless sensor network by Raja Mohd. Radzi, Raja Zahilah

    Published 2007
    “…Thus, the project aims to provide a secure WSN through frequency hopping at the network layer. In this work, Ad hoc On Demand Distance Vector Routing algorithm is used to determine the route and un-Slotted Carrier Sense Multiple Access / Collision Avoidance (slotted CSMA/CA) algorithm is used to access the medium. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementation of Frequency Drift for Identification of Solar Radio Burst Type II by Roslan, Umar, Nur Zulaikha, Mohd Afandi, Zamri, Zainal Abidin

    Published 2016
    “…The value of frequency drift was used as the main idea in this auto classify algorithm because it can easily implemented using MATLAB. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Time Difference Of Arrival Estimation Using Fast Fourier Transform Overlap For Underwater Positioning by Tan, Chee Sheng

    Published 2019
    “…The TDOA estimation is derived based on the intensity of a received signal with the frequency of interest. An extraction of a signal from a receiver is performed by using digital signal processing algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower by Gatea, Sarah Jabbar

    Published 2018
    “…The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
    Get full text
    Get full text
    Thesis