Search Results - (( java implementation modified algorithm ) OR ( using quality filing algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    A Comparative Study on Compression of Different Image File Formats by Ooi, Poh San

    Published 1999
    “…Beside that, the quality of image that can be produced by LZW algorithm and RLE algorithm is almost the same.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Steganography : concealing texts within an image using least significant BIT technique on BMP image format / Farabi Aizat Mohd Aminnuddin by Mohd Aminnuddin, Farabi Aizat

    Published 2019
    “…This research used Least Significant Bits (LSB) as the algorithm to embed the messages. …”
    Get full text
    Get full text
    Student Project
  7. 7
  8. 8
  9. 9

    On the Identification of FOSD-based Non-zero Onset Speech Dataset by Tran, D.C., Ibrahim, R.

    Published 2020
    “…In such tools, often onset detection algorithms are utilized for labeling the audio file's speech start and end times. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Prototype development for embedding large amount of information using secure LSB and neural based steganography by Saleh, Basam N.

    Published 2009
    “…The need for new methods, techniques and algorithms to make enhancements regarding increasing the amount the hidden information, preserving the host file quality, preserving the size of the file, and keep it robust against steganalysis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Performance evaluation of compression techniques on scientific dataset / Lam Wai Leong by Lam , Wai Leong

    Published 2006
    “…This project proves that a generic compression algorithm fair better compare to a more format specific compression algorithm when use on a scientific datasets. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…These two indicators are used to calculate and analyse the file size reduction and the ability of the file to be reconstructed back to its original form without compromising its quality. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An Adaptive Multi Amplitude Thresholds Embedding Algorithm for Audio Steganography by Alsabhany, A.A., Mohd Ridzuan, F.H., Azni Hazlizan Ab Halim

    Published 2024
    “…The algorithm uses AES-256 to increase the level of robustness. …”
    Article
  14. 14

    Big Data Mining Using K-Means and DBSCAN Clustering Techniques by Fawzia Omer, A., Mohammed, H.A., Awadallah, M.A., Khan, Z., Abrar, S.U., Shah, M.D.

    Published 2022
    “…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
    Get full text
    Get full text
    Article
  15. 15

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    An intermediate significant bit (ISB) watermarking technique using neural networks by Zeki, A., Abubakar, A., Chiroma, H.

    Published 2016
    “…Many researchers have used these approaches to evaluate their algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Resource scheduling algorithm with load balancing for cloud service provisioning by Priya, V., Sathiya Kumar, C., Kannan, R.

    Published 2019
    “…Cloud computing uses scheduling and load balancing for virtualized file sharing in cloud infrastructure. …”
    Get full text
    Get full text
    Article
  19. 19

    Parallelization of speech compression based algorithm based on human auditory system on multicore system by Gunawan, Teddy Surya, Kartiwi, Mira, Khalifa, Othman Omran

    Published 2012
    “…Matlab parallel computing toolbox was used in the implementation. Finally, the performance of the developed parallel algorithm was evaluated using Perceptual Evaluation of Speech Quality (PESQ) and parallel execution time. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis