Search Results - (( data generating query algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    The skyline operator algorithms: a review by Mohd Rum, Siti Nurulain, Mohd Ariffin, Noor Afiza, Asmawi, Aziah, Mohd Rum, Siti Fatimah, Dzolkhifli, Zarina

    Published 2019
    “…In the present decade, there is the revival of interest to find the best way to query the database that able to provide not only a single answer, but also a set of answers that can be the most preferred by users .In many cases, the overflow of data generated from social media, and many other data stored and shared over the Internet makes the data access becoming near –infinite to the users. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…Furthermore, the hash-join and Sort-Merge algorithms were used to generate the join query processing, and this was employed due to their capacity to allow for more data sets to be joined. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
    Get full text
    Get full text
    Article
  6. 6

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The large amount of data generated and frequent changes in a short time make conventional processing methods insufficient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Skyline queries on data with uncertain dimensions for efficient computation by Mohd Saad, Nurul Husna

    Published 2018
    “…Skyline query is crucial in multi-criteria decision making applications particularly in applications that generate uncertain data. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The experiments were conducted on self generated data sets (7 different sets) and well known datasets (Mushroom & Cars Data set). …”
    Get full text
    Get full text
    Thesis
  9. 9

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Dominance analyses reduction in skyline query processing over data stream with data mining technique by Ahmed Mohamud, Mudathir, Ibrahim, Hamidah, Sidi, Fatimah, Mohd Rum, Siti Nurulain

    Published 2025
    “…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    A flexible query transformation framework for structured retrieval / Gan Keng Hoon by Gan, Keng Hoon

    Published 2013
    “…Its main strength is to allow the transformation to be generic to cater for more than single type of structure query. Supporting this intermediate query representation are the query interpretation and query construction algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Keyword query processing interface model of ontological natural language manipulation by Hasany, Syed Muhammad Noman

    Published 2010
    “…The generated target queries are required to be ranked so that the results are reported in order to their relevance to the user query. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Evaluation of XML documents queries based on native XML database by Lazim, Raghad Yaseen

    Published 2016
    “…Most of the figures show that the XED starts better, but becomes worse as data size grows. The difference becomes obvious as the query becomes more complicated.…”
    Get full text
    Get full text
    Thesis
  16. 16

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
    Get full text
    Get full text
    Thesis
  17. 17

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…The thesis presents the design, necessary data structures, algorithms and implementation details of JLOG. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Synchronization algorithm for remote heterogeneous database environment by Imam, A.A., Basri, S.B., Ahmad, R.B.

    Published 2015
    “…To achieve this feat, three separate algorithms are generated. In addition, jQuery technology is adopted to determine the active path, and the data is transmitted via web service that operates on XML technology over HTTP protocol. …”
    Get full text
    Get full text
    Article