Search Results - (( java implementation modified algorithm ) OR ( using reflective method algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Retrieval Of Environmental Parameters Over Water Areas Using MODIS Data by Amin, Abd Rahman Mat

    Published 2012
    “…The presence of sediment reflectance in the MODIS imagery not only saturate the ocean color channels, but also enhance the reflectance of near infrared channels used in the atmospheric correction algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of lightning current and ground reflection factor using measured electromagnetic field by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Hajikhani, Maryam

    Published 2014
    “…In order to validate the proposed method, a set of measured electromagnetic fields are used as the input parameters for the proposed algorithm. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing by Tan, Sek Aun

    Published 2004
    “…Initially, digital number (DN) of imagery was corrected and converted into reflectance values for algorithm development. Subsequently combinations of various radiometric correction methods were used in this study to reduce the errors from various sources prior to statistical analysis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Method of Moment Analysis Using Open-Ended Coaxial Sensor in Determination of Corn Reflection Coefficient by Soleimani, Hojjatollah

    Published 2010
    “…So finally, their algorithms are easily programmable on computer. The computation of reflection coefficient of the corn was programmed using MATLAB software for the admittance approach and Method of Moment (MOM). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…The developed algorithm is validated using some froth images captured at different operating conditions, so the results indicate that the method can segment the mixture of big and small bubbles effectively.…”
    Get full text
    Get full text
    Article
  12. 12

    A Study Of Salting Method for Image Protection by Ahmad Faeez bin Lukman

    Published 2013
    “…This study will review various algorithm to be used in securing the password, including password hashing algorithms MD5 and SHA-1, along with types of commonly used attack for this type of situation. …”
    Other
  13. 13
  14. 14

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…The simulation results demonstrate that the algorithm can minimize the limitations of the existing methods and it can use the PV generation system effectively. …”
    Get full text
    Get full text
    Article
  15. 15

    Near Real Time Processing of NOAA AVHRR Satellite Data by Hassan, Quazi Khalid

    Published 1998
    “…There are five cloud masking techn iques namely gross cloud check, spatial coherence method, dynamic visible and near infrared method, ratio of near infrared reflectance to visible reflectance and channel difference method have been implemented. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Classification of Diabetes Mellitus using Ensemble Algorithms by Noor, N.A.B.S., Elamvazuthi, I., Yahya, N.

    Published 2021
    “…Data mining and machine learning techniques can be extremely useful in classification of DM considering the need to have a shift from current traditional methods which use sharp needles to draw blood towards a non - invasive method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20