Search Results - (( basic content based algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- basic content »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
6
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. The documents are divided into smaller, recognized labels that are intensive and flexible for managing, editing, and extracting. …”
Get full text
Get full text
Research Reports -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features
Published 2023“…However, these surveys are not covered for both IC-MFD algorithms based hand-crafted features and IC-MFDs algorithms based machine-crafted features. …”
Article -
10
Shot boundary detection based on orthogonal polynomial
Published 2019“…The outcomes of the comparative analysis show the superior performance of the proposed algorithm against other existing algorithms.…”
Get full text
Get full text
Get full text
Article -
11
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The prototype has been developed to allow the segmentation and the existence of content-based to the letter document. The documents are divided into smaller, recognized labels that are intensive and flexible for managing, editing, and extracting. …”
Get full text
Get full text
Research Reports -
12
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Protein sequence annotation is important for the preservation and reuse of knowledge, for content-based queries, and for the understanding of its function. …”
Get full text
Get full text
Monograph -
13
Disposable Biomimetic Array Sensor Strip Coupled With Chemometric Algorithm For Quality Assessment Of Orthosiphon Stamineus Benth Samples
Published 2006“…A disposable screen printed array sensor strip based on self-plasticized methacrylate acrylate PVC blend lipid membranes combined with chemometric algorithm has been developed and applied for qualitative and quantitative analysis of O.stamineus samples. …”
Get full text
Get full text
Thesis -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
15
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Retrieval based on skin color to detect the malicious images
Published 2009“…Image filtering and retrieval application process has been explored widely. The most basic filtering and retrieval system that is based on extensions of textual database search, is a system where keywords interpreting the images usually describing the certain aspects of the image content. …”
Get full text
Get full text
Get full text
Research Report -
17
-
18
Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network
Published 2006“…The SNT adapts contention parameters of individual ACs based on the network load in a basic service set (BSS). …”
Get full text
Get full text
Thesis -
19
Cryptocurrency vs fiat currency: Architecture, algorithm, cashflow & ledger technology on emerging economy subtitle: The influential facts of cryptocurrency and fiat currency
Published 2018“…This review paper is basically focused on most influential facts behind the economical elements like the applicable operation via successful blockchain algorithm, architecture and mining operation based on contents from journal publications, online publications, news reports, seminars and workshops. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
The identification of alcohol percentage limit in halal food using fuzzy logic
Published 2021“…This algorithm and basic framework will be the first step in developing a user-friendly tool that will later benefit the consumer as well as function as an auditor especially in order to control the alcohol content in halal food and beverages.…”
Get full text
Get full text
Get full text
Book Chapter
