Search Results - (( java implementation modified algorithm ) OR ( using rational testing algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- testing algorithm »
- rational testing »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Data fitting by G1 rational cubic Be´zier curves using harmony search
Published 2015“…Statistical testing between HS and two other different metaheuristic algorithms is used in the analysis on several outline images. …”
Get full text
Get full text
Article -
3
Data Fitting by G1 Rational Cubic Bézier Curves Using Harmony Search
Published 2015“…Statistical testing between HS and two other different metaheuristic algorithms is used in the analysis on several outline images. …”
Get full text
Get full text
Get full text
Article -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Development of symbolic algorithms for certain algebraic processes
Published 2007“…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
Get full text
Get full text
Get full text
Monograph -
6
Development of symbolic algorithms for certain algebraic processes
Published 2007“…From a general algorithm using the comrade matrix approach, the nonmodular and modular techniques are prescribed. …”
Get full text
Get full text
Get full text
Monograph -
7
Curve fitting by rational cubic Bézier with C1 and G1 continuity using metaheuristics methods
Published 2019“…Rational cubic Bézier curves are used to approximate the data sets while minimizing the least-squares error function using different metaheuristics algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
10
Rational methods for solving first order ordinary differential equation
Published 2019“…Meanwhile, the second class uses a rational function with the numerator of degree one, as the degree of its denominator increases. …”
Get full text
Get full text
Thesis -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Evaluation method of rationality of urban landscape facility design based on neural network
Published 2025“…Therefore, this study formulates a scientific and reasonable evaluation index system for the rationality of urban landscape facility design and uses a neural network to carry out intelligent evaluation, in order to obtain optimal evaluation outcomes. …”
Get full text
Get full text
Article -
13
Composite slab numerical strength test method under partial connection approach
Published 2017“…This study seeks to address this challenge by developing and a subsequent experimental validation of a numerical strength determination function for PCS through implementing a rational-based approach. Hence, a procedural algorithm lead to the development of PCS determination function using longitudinal shear estimation method by considering section slenderness and deck characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
15
Automatic diagnosis of diabetic retinopathy from fundus images using digital signal and image processing techniques
Published 2007“…The algorithm was tested with a separate set of 25 fundus images. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
17
A modified strength capacity for composite slab using reliability approach
Published 2016“…The strength test performance between the developed scheme and the experiment based test results indicates high similarity, demonstrating the viability of the proposed strength determination methodology developed in this study.…”
Get full text
Get full text
Thesis -
18
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
19
Power amplifier memory polynomial predistorter for long term evolution application
Published 2015“…These nonlinear modeling techniques can be applied to the design of successful predistortion algorithms. The overall structure of a linearized transmitter using Memory Polynomial Digital Predistortion (MP DPD) architecture is represented to obtain both linearity and efficiency of the nonlinear PAs. …”
Get full text
Get full text
Thesis -
20
Recursive construction of output-context fuzzy systems for the condition monitoring of electrical hotspots based on infrared thermography
Published 2015“…The proposed RCFS realizes the prominent distinctions in the output domain by using a self-organizing method. The termination of the recursive algorithm finds an effective rule base to achieve an accurate representation of the datasets. …”
Get full text
Get full text
Get full text
Article
