Search Results - (( java implementation modified algorithm ) OR ( using network data algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- data algorithm »
- network data »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
AntNet: a robust routing algorithm for data networks
Published 2004“…AntNet is an innovative algorithm that may be used for data networks. It is a combination of both static and dynamic routing algorithms. …”
Get full text
Get full text
Get full text
Article -
8
A new compression algorithm for small data communication in wireless sensor network
Published 2017“…Fortunately, data compression can be used to minimise the transmitted data size and thus extend sensor's lifetime. …”
Get full text
Get full text
Get full text
Article -
9
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…All the data for 18-bus system test are taken from previous work, and all the data for 49-bus system test are taken from an existing Iraqi distribution network. …”
Get full text
Get full text
Thesis -
10
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2015“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
12
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…Moreover, network anomaly detection using machine learning faced difficulty when dealing the involvement of dataset where the number of labelled network dataset is very few in public and this caused many researchers keep used the most commonly network dataset (KDDCup99) which is not relevant to employ the machine learning (ML) algorithms for a classification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
Get full text
Get full text
Student Project -
15
Development of a wireless mesh network routing algorithm for oil and gas pipeline networks
Published 2021“…A larger amount of data are generated into the traffic as more number of sensor nodes introduced in the network. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improved handover decision algorithm using multiple criteria
Published 2018“…The transfer of massive data between varied network positions links of network relies on data rate, as well as the traffic capacity of the network. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Online Dynamic Replication and Placement Algorithms for Cost Optimization of Online Social Networks in Two-tier Multi-cloud
Published 2024journal::journal article -
18
The use of people rank technique for data dissemination in opportunistic network
Published 2015Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Optimizing the latency of the 4G network by using Routing Algorithm / Rossidah Wan Abdul Aziz ... [et al.]
Published 2022“…Extreme latency is becoming increasingly common as networks grow. This research objective is to determine minimum network latency using a Routing Algorithm in 4G network and to classify which 4G network operators arethe best by using Routing Algorithm. …”
Get full text
Get full text
Monograph -
20
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm is an optimizer tool and developed using of echolocation characteristics of bats, while the neural network is learning methods that approach the human brain using artificial neurons. …”
Get full text
Get full text
Article
