Search Results - (( java implementation modified algorithm ) OR ( using same using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- using same »
- same using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions
Published 2014“…In order to ensure fair comparison, both BFO and BA are implemented using the same data structure and the same language and running in the same platform (i.e. …”
Get full text
Get full text
Conference or Workshop Item -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
Get full text
Get full text
Thesis -
10
Time normalization of LPC feature using warping method
Published 2005“…Another task is to align the input frames (test set) to the reference template (training set) using DTW fixing frame (DTW-FF) algorithm. This proper time normalization is needed since NN is designed to compare data of the same length whilst same speech can varies in their length. …”
Get full text
Get full text
Get full text
Article -
11
Travelling salesman problem using genetic algorithm / Muhammad Faiz Wafiq Mohd Zaini, Nurin Hannani Mohd Bakhary and Nur Aishah Zakaria
Published 2022“…In each iteration, the selection step compare and select the minimum distance for each chromosome. The result shows using Genetic Algorithm operator can help Travelling Salesmen to minimize the distance effectively and to make it more effective Travelling Salesmen need to use three Genetic Algorithms’ operator. …”
Get full text
Get full text
Student Project -
12
DC Motor Controller Using Linear Quadratic Regulator (LQR) Algorithm Implementation on PIC
Published 2008“…As the result, the output must be the same as or approximately the same as the input voltage. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB
Published 2010“…One of ME techniques, known as Block Matching Algorithm (BMA), has been widely used in various video coding standards. …”
Get full text
Get full text
Article -
14
Affine projection algorithm for speech enhancement using controlled projection order
Published 2020“…The MSE of the proposed VPAPA method drops to -65 dB in steady state compared to -20 dB using NLMS and just below -30 dB using standard APA with projection order of 8, while the powerful RLS reaches around -60dB under the same environment. …”
Get full text
Get full text
Get full text
Article -
15
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
16
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…The algorithm may be developed for application in other field that uses greyscale image as well.…”
Get full text
Get full text
Monograph -
17
An improved method in speech signal input representation based on DTW technique for NN speech recognition system
Published 2007“…Another task of the study is to extract pitch features using the Harmonic Filter algorithm. After pitch extraction and linear predictive coefficient (LPC) features fixed to a desired number of frames, speech recognition using neural network can be performed and results showed a very promising solution. …”
Get full text
Get full text
Get full text
Article -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
Get full text
Get full text
Thesis -
20
Implementation Of Hardware Software Partitioning In Embedded System
Published 2018“…The result shows that, the GA algorithm has better total area and total execution time but same cost compared to the PSO algorithm. …”
Get full text
Get full text
Monograph
