Search Results - (( java implementation modified algorithm ) OR ( using scheme using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics by Yap, Wen Jiun

    Published 2003
    “…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Post quantum signature schemes for the block chain technology by Wu, Zi Feng

    Published 2019
    “…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi by Husairi, Nurul Syazwani, Mohd Fauzi, Nurul Aqilah

    Published 2023
    “…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
    Get full text
    Get full text
    Student Project
  9. 9

    A Fast Scheduling Algorithm for WDM Optical Networks by Cheah, Cheng Lai

    Published 2000
    “…These schemes use different criteria to select packets from the nodes for scheduling. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…The research goes on to compare the energy consumptions for encryption and decryption using the AAḃ AAp scheme with similar processes using the Textbook RSA scheme on the aforesaid embedded platforms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models by DERIB ASFAW, TILAHUN

    Published 2013
    “…The fitness function of the genetic algorithm model (GAM) was to minimize the difference between the potential capacity and actual generation of the scheme. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon by Samaon, Azrinawati

    Published 2014
    “…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the waterfdling when using signal-to-noise ratio (SNR) with value 6dB. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…According to the experimental results, the proposed algorithm improves PSNR with at least 5.4 compared to the previous schemes.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon by Samaon, Azrinawati

    Published 2016
    “…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the water-filling when using signal-to-noise ratio (SNR) with value 6dB. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Efficient algorithms for the key representation auditing scheme. by Asim Abdallah, Elshiekh, Dominic P, Dhanapal Durai

    Published 2009
    “…Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used.…”
    Get full text
    Get full text
    Citation Index Journal
  19. 19

    Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake by Mat Ibrahim, Masrullizam, Soraghan , John, Abd Manap, Nurulfajar

    Published 2014
    “…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
    Get full text
    Get full text
    Thesis