Search Results - (( data information system algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- information system »
- data information »
- system algorithm »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Boyer-Moore horspool algorithm used in content management system of data fast searching
Published 2017“…An enormous amount of data stored in content management system as few big module as product data, slider data, personal information data, company information data, account data and another kind of data may refer to the different type of content management system and developer set. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
10
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
11
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
An intelligent data mapping for hydrological information system (his) cube data base to cater from various data types
Published 2004“…Information Extraction is a process that extracts information from existing system source and stores into a database. …”
Get full text
Get full text
Monograph -
13
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
Published 2025“…Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
Get full text
Get full text
Get full text
Thesis -
14
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011“…The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Book recommender mobile application / Amir Imran Kamaludin
Published 2021“…Recommendation system solves this problem by automatically sorting through the massive amounts of data and identify user’s interest and makes the information searching much more easily. …”
Get full text
Get full text
Thesis -
17
Information retrieval system (IRS) process on Hansard document / Suraya Saad
Published 2007“…This research develops an algorithm which will enhance the current system. One of the IR process is to split the document into subdocument to ease searching relevant information. …”
Get full text
Get full text
Thesis -
18
An Improvement on Extended Kalman Filter for Neural Network Training
Published 2005“…Extracting useful imformation and knowledge from data is a major concern in information science. Artificial intelligence systems, such as neural network systems, are widely used to extract and infer knowledge from databases. …”
Get full text
Get full text
Thesis -
19
Pengekstrakan data berasaskan pendekatan ontologi: kes data jujukan hidrologi
Published 2005“…Information Extraction is a process that extracts information from existing system source and stores into a database. …”
Get full text
Get full text
Thesis -
20
Jogging activity recognition using k-NN algorithm
Published 2022“…This system will give the user classification of the jogging activity after the information data is processed. …”
Get full text
Get full text
Get full text
Academic Exercise
