Search Results - (( java implementation modified algorithm ) OR ( using generation using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using generation »
- generation using »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
3
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…Before this, Sudoku generator has been develop using backtracking algorithm only, but this research use two algorithm which is recursive and backtracking algorithm that called as hybrid algorithm. …”
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
Get full text
Get full text
Research Report -
9
An improved algorithm in test case generation from UML activity diagram using activity path
Published 2011“…This paper proposed an improved algorithm to automatically generate test cases directly from UML activity diagram using an activity graph.This algorithm has been implemented as a prototype using UML activity diagrams as inputs to generate test cases.These generated test cases are generated automatically are compared to test cases that are generated manually in order to evaluate the algorithm’s usability and reliability.The result shows that the test cases generated by the developed test case generator program are the same as the one manually derived.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
11
Contour generation for mask projection stereolithography 3D printing
Published 2019“…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
Get full text
Get full text
Thesis -
12
A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system
Published 2021“…The simulation results demonstrate that the algorithm can minimize the limitations of the existing methods and it can use the PV generation system effectively. …”
Get full text
Get full text
Article -
13
Optimization of hydropower reservoir operation based on hedging policy using Jaya algorithm
Published 2023Article -
14
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013“…This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling
Published 2022“…The proposed models and algorithm can be used to solve the multi-objective GMS problem while the new parameters’ values can be used to obtain optimal or near optimal maintenance scheduling of generators. …”
Get full text
Get full text
Get full text
Thesis -
16
Enhancement of RSA Key Generation Using Identity
Published 2015“…The purpose of this paper is to enhance previous algorithm called Tripathi algorithm. The Tripathi algorithm proposes an RSA based algorithm to generate cryptographic keys using user identity such as email address of a person. …”
Get full text
Get full text
Get full text
Book Chapter -
17
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
18
Hybrid anti-islanding algorithm for utility interconnection of distributed generation
Published 2009“…In this paper hybrid anti-islanding algorithm for utility interconnection of distributed generation is proposed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Metaheuristic searching genetic algorithm based reliability assessment of hybrid power generation system
Published 2020“…The usefulness of the proposed algorithm was tested using Reliability Test System ‘IEEE-RTS-79’ which include both of wind power and solar power generation. …”
Get full text
Get full text
Get full text
Article -
20
Pumped-storage scheduling using particle swarm optimization / Amirul Asraf Razali
Published 2012“…The basic PSO algorithms_is been used to determine the economic dispatch of the hydrothermal generation with pumped-storage unit. …”
Get full text
Get full text
Thesis
