Search Results - (( java implementation modified algorithm ) OR ( using scheme using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- using scheme »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
6
Post quantum signature schemes for the block chain technology
Published 2019“…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Quality of service management algorithms in WiMAX networks
Published 2015“…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
Get full text
Get full text
Thesis -
8
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
9
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…These schemes use different criteria to select packets from the nodes for scheduling. …”
Get full text
Get full text
Thesis -
10
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…The research goes on to compare the energy consumptions for encryption and decryption using the AAḃ AAp scheme with similar processes using the Textbook RSA scheme on the aforesaid embedded platforms. …”
Get full text
Get full text
Thesis -
11
-
12
Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models
Published 2013“…The fitness function of the genetic algorithm model (GAM) was to minimize the difference between the potential capacity and actual generation of the scheme. …”
Get full text
Get full text
Thesis -
13
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the waterfdling when using signal-to-noise ratio (SNR) with value 6dB. …”
Get full text
Get full text
Article -
14
-
15
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…According to the experimental results, the proposed algorithm improves PSNR with at least 5.4 compared to the previous schemes.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon
Published 2016“…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the water-filling when using signal-to-noise ratio (SNR) with value 6dB. …”
Get full text
Get full text
Thesis -
17
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…The improved algorithm is used to obtain the rough obstacle avoidance of the vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
18
Efficient algorithms for the key representation auditing scheme.
Published 2009“…Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used.…”
Get full text
Get full text
Citation Index Journal -
19
Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake
Published 2014“…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
Get full text
Get full text
Get full text
Article -
20
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
Get full text
Get full text
Thesis
