Search Results - (( java implementation modified algorithm ) OR ( using making process algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Diabetes prediction system using clonal selection algorithm / Nor Aishah Mustapa by Mustapa, Nor Aishah

    Published 2012
    “…There are many techniques that can be used to make prediction process but the technique that has been selected to be used for this system is Artificial Immune System. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…However, for optimum distance, dijkstra algorithm has been used. This algorithm is one of the algorithms used for getting the lowest cost search path. …”
    Get full text
    Get full text
    Thesis
  11. 11

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, Khan

    Published 2011
    “…decision making. Timely identification of newly emerging trends is needed in business process. …”
    Get full text
    Get full text
    Citation Index Journal
  12. 12

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
    Get full text
    Get full text
    Citation Index Journal
  13. 13

    Letter recognition using backpropagation algorithm by Azrul Hafiz, Awang

    Published 2010
    “…This application will be developed using C++ Builder. Letter Recognition using Backpropagation Algorithm will make analysis and show the accuracy percentage, errors and the result of the letter training. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Mobile application for blood donation using geolocation and rule-based algorithm / Muhammad Firzan Azrai Nuzilan and Mohd Ali Mohd Isa by Nuzilan, Muhammad Firzan Azrai, Mohd Isa, Mohd Ali

    Published 2021
    “…Besides, the rule-based algorithm is estimated to make the blood donation process goes efficiently by filtering the characteristic so that only suitable donor can donate the blood. …”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15
  16. 16

    Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis by Mukhlis, Siti Farah Najwa

    Published 2017
    “…Therefore many research have been done to develop this type of computer game by using the Al techniques. In Dam Haji game, the goal is to find the optimal movement to make, so A* algorithm, which is a pathfinding algorithm is used. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hybrid Algorithm for Hand Gesture Recognition by Gupta, Shikha, Jaafar, J., Wan Ahmad, Wan Fatimah

    Published 2012
    “…Hence in this paper, a hybrid algorithm is being introduced to reduce the complexity of process also to make it insensitive with respect to the position of camera by making use of Gabor filer to get the structure of the hand followed by the Mel scaling in order to reduce the dimensions along with feature extraction using triangular filters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Information retrieval system (IRS) process on Hansard document / Suraya Saad by Saad, Suraya

    Published 2007
    “…The algorithm will be developed to split the document into few subdocuments by using keywords. …”
    Get full text
    Get full text
    Thesis