Search Results - (( java implementation modified algorithm ) OR ( using ranking process algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    TOPSIS-based Regression Algorithms Evaluation by Abu-Shareha, Ahmad Adel

    Published 2022
    “…The results showed that different preferences led to varying algorithm rankings, but top-ranked algorithms were distinguished using a specific dataset. …”
    Get full text
    Get full text
    Article
  7. 7

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The Wilcoxon signed ranked statistical test shows that the ssSKF algorithm that uses an adaptive local neighbourhood in the prediction phase performs statistically better than the SKF algorithm that uses the last estimated state as its prediction, especially in solving high dimensional functions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid by Abdul Hamid, Zulkiffli

    Published 2013
    “…Contrary to conventional techniques which mainly rely on matrix operation, the proposed algorithm implements optimization technique as an alternative for performing the tracing process. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid by Abdul Hamid, Zulkiffli

    Published 2013
    “…Contrary to conventional techniques which mainly rely on matrix operation, the proposed algorithm implements optimization technique as an alternative for performing the tracing process. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A new fuzzy peer assessment methodology for cooperative learning of students by Tay, Kai Meng, Kok, Chin Chai, Chee, Peng Lim

    Published 2015
    “…The proposed methodology is a synthesis of perceptual computing (Per-C) and a fuzzy ranking algorithm. Per-C is adopted because it allows uncertainties of words to be considered in the evaluation process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Optimizing n-1 contingency rankings using a nature-inspired modified sine cosine algorithm by Priyadi, Irnanda, Daratha, Novalio, Gunawan, Teddy Surya, Ramli, Kalamullah, Jalistio, Febrian, Mokhlis, Hazlie

    Published 2025
    “…A novel approach utilizing the Modified Sine Cosine Algorithm (MSCA), a nature-inspired metaheuristic optimization technique, is proposed to resolve (N-1) contingency rankings efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding by Sarwar, Talha, Mohd Noor, Noorhuzaimi Karimah, Miah, M. Saef Ullah

    Published 2022
    “…However, selecting the most appropriate algorithm is also a problem. Therefore, this study analyzes various supervised and unsupervised keyphrase extraction algorithms, namely KEA, KP-Miner, YAKE, MultipartiteRank, TopicRank, and TeKET, which are used to extract keyphrases from news articles. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection by Iqbal, Muhammad

    Published 2023
    “…The statistical tools (Absolute Mean Error & Fried Man) are used to rank the performance of all algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Finite impulse response optimizers for solving optimization problems by Tasiransurini, Ab Rahman

    Published 2019
    “…Statistical analysis using the Friedman test and Holm post hoc test are performed to rank the performances of FIROs. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Finite impulse response optimizers for solving optimization problems by Ab Rahman, Tasiransurini

    Published 2019
    “…Statistical analysis using the Friedman test and Holm post hoc test are performed to rank the performances of FIROs. …”
    Get full text
    Get full text
    Thesis