Search Results - (( java implementation modified algorithm ) OR ( using using three algorithm ))

Refine Results
  1. 1

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd by Nur Farahaina, Idris

    Published 2022
    “…There are various decision tree algorithms, but the most commonly used are Iterative Dichotomiser 3 (ID3), CART, and C4.5. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field by Md Yasin, Sharifah

    Published 2011
    “…The cost of three scalar multiplication algorithms are compared: double-and-add, additionsubtraction and new signed-digit {0,1,3}-NAF scalar multiplication. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA) by Odeh, Ali Ahmad Alabd Abu

    Published 2012
    “…This study aims to use Wavelet Transform Algorithm for image compression. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An extended ID3 decision tree algorithm for spatial data by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2011
    “…As in the ID3 algorithm that use information gain in the attribute selection, the proposed algorithm uses the spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system by -, -

    Published 2019
    “…The proposed slicing algorithm uses line-plane intersection model to generate arbitrary line segment when it receives an STL facet. …”
    Get full text
    Get full text
    Research Report
  17. 17

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…Therefore, for the second objective, another algorithm named the fuzzy algorithm is designed which combines the clustering algorithm, matching algorithm, triangle area algorithm and average Euclidean algorithm used to estimate location. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Optimisation of Surface Roughness in 3D Printing Using the Bees Algorithm by Kamaruddin, Shafie, Ridzuan, Arman Hilmi, Sukindar, Nor Aiman

    Published 2025
    “…One of the main challenges in this additive manufacturing technology is selecting proper input process parameters to achieve good quality of the 3D printed model. The focus of this study is to determine the optimum input parameter of the 3D printer using the Bees Algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter