Search Results - (( java implementation modified algorithm ) OR ( using sharing using algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Accounting Information Systems Genetic Algorithms for All-Optical Shared Fiber-Delay-Line Packet Switches by Liew, S.Y., Wong, E.S.K.

    Published 2009
    “…In this paper, we propose two fast scheduling algorithms for all-optical shared-FDL packet switches. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…In the field of network security, the role of cryptography is most important. A secrecy key and shared key algorithm is known as a symmetric key algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    A static jobs scheduling for independent jobs in Grid Environment by using Fuzzy C-Mean and Genetic algorithms by Lorpunmanee, Siriluck, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Srinoy, Surat

    Published 2006
    “…We present a static job scheduling algorithm by using Fuzzy C-Mean and Genetic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm by Lorpunmanee, Siriluck, Sap, M.N.M, Abdullah, Abdul Hanan, Srinoy, Surat

    Published 2006
    “…The minimization is proposed by using a multiple objective genetic algorithm (GA), because the job scheduling problem is NP-hard problem. …”
    Get full text
    Article
  12. 12

    Efficient usage strategy of limited shared memory in Graphical Processing Unit (GPU) for accelerate DNA sequence alignment / Ahmad Hasif Azman by Azman, Ahmad Hasif

    Published 2023
    “…In this study, the focus is on utilizing the memory capabilities of GPUs to accelerate the Smith-Waterman algorithm has been proposed. Three new approaches based on global memory, shared memory and a combination of global and shared memory are used in this design. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm by Harshada Nerkar, Kundu, Prasanta, Chowdhury, Anandita

    Published 2023
    “…The graph theory network gives the idea about the distance between the nodes and it is helpful to find the share of power from the generating sources. In this paper, we calculate the shortest path between the nodes or substations by using Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Task scheduling on computational grids using Gravitational Search Algorithm by Zarrabi, Amirreza, Samsudin, Khairulmizam

    Published 2014
    “…In this paper, Gravitational Search Algorithm (GSA), as one of the latest population-based metaheuristic algorithms, is used for task scheduling on computational Grids. …”
    Get full text
    Get full text
    Article
  15. 15

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secure file sharing with public key infrastructure (PKI) enablement / Noor Azlina Ismail @ Hassan by Ismail @ Hassan, Noor Azlina

    Published 2015
    “…This system will used RSA and SHA-256 to produce digital signature because both of the algorithm consist more advantages than other algorithm which is suitable to used to protect document in current insecure network. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modified workflow scheduling using hybrid PSO-GA algorithm in cloud computing by Oke, Omotayo Patrick

    Published 2019
    “…Cloud computing environment offers customers with multiple on-demand services and resource sharing. Business processes are managed using cloud-based workflow technology, which is one of the difficulties of using resources efficiently owing to the inter-task dependencies. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A provision-aware fair bandwidth distribution marker algorithm for DiffServ networks by Sani, Yusuf, Othman, Mohamed

    Published 2011
    “…In this paper, we propose a new three-colour marker, named paItswTCM (provision-aware Improved TSW based Three-Colour Marker). We compare our new algorithm with both time-sliding window markers and token-bucket-based markers using simulations. …”
    Get full text
    Get full text
    Get full text
    Article