Search Results - (( java implementation modified algorithm ) OR ( using name based algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using name »
- name based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
Finite impulse response optimizers for solving optimization problems
Published 2019“…In this work, three new estimation-based metaheuristic algorithms are introduced. The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
Get full text
Get full text
Thesis -
9
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In addition, two novel Jaya-based methods namely, the modified Jaya (MJaya) algorithm and quasi-oppositional modified Jaya (QOMJaya) algorithm are proposed to solve different MOOPF problems. …”
Get full text
Get full text
Thesis -
10
Finite impulse response optimizers for solving optimization problems
Published 2019“…In this work, three new estimation-based metaheuristic algorithms are introduced. The first algorithm is a single-agent-based algorithm, named Single-agent FIR optimizer (SAFIRO). …”
Get full text
Get full text
Thesis -
11
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…For this reason, in this research,several auxiliary algorithms are introduced to improve the performance of the classification algorithm, namely the meta-heuristic algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The NS3 simulations and the Internet2 topology were used to evaluate and analyze the findings of each algorithm, and to compare the results based on cache sizes: 1GB, 10GB, 100GB, and 1TB. …”
Get full text
Get full text
Get full text
Thesis -
14
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…Therefore, for the second objective, another algorithm named the fuzzy algorithm is designed which combines the clustering algorithm, matching algorithm, triangle area algorithm and average Euclidean algorithm used to estimate location. …”
Get full text
Get full text
Thesis -
15
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
16
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm is implemented in the Gene Ontology browser named basic UTMGO to overcome the weaknesses of the existing Gene Ontology browsers which use a conventional approach based on keyword matching. …”
Get full text
Get full text
Get full text
Article -
17
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
18
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
19
An efficient VM scheduling algorithm to minimize the makespan and maximize the profit
Published 2019“…The second process is hyper analytical task scheduling algorithm, and based on the scheduled task, the policy based profit maximization algorithm was proposed in final process. …”
Get full text
Get full text
Thesis -
20
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis
