Search Results - (( developing assessing efficient algorithm ) OR ( java extraction method algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Algorithm analyzer to check the efficiency of codes by Arvaree @ Alvar, Thamilvaani, Atan, Rodziah

    Published 2011
    “…Efficiency of codes developed is always an issue in software development. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Image quality analysis by Shankar, Krishnan.

    Published 2009
    “…B ovik , the Peak Signal - to - Noise Ratio ( PSNR ) Bl ock - Set, and the Mean Squared Error ( MSE ) calculating algorithm. By doing so, a better understanding of what is actually required to develop an efficient image quality assessment method was gained. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…The aim of the study is to develop an algorithm that can extract a minimum set of factors that can be used to assess companies’ performances. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…The development of the prediction tool was conducted base on integrating three sequenced algorithms, which are sun position algorithm, shadow length and position algorithm, and expansion limit algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Research Report
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks by A. A Aziz, Azrina, Sekercioglu, Y. Ahmet, Fitzpatrick, Paul, Ivanovich, Milosh

    Published 2013
    “…First, we review the significant topology control algorithms to provide insights into how energy efficiency is achieved by design. …”
    Get full text
    Get full text
    Citation Index Journal
  14. 14

    A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network by Almuslehi, Hussein Saad Mohammed

    Published 2023
    “…This optimizes data transmission, enhances energy efficiency, and extends network longevity. The ACO algorithm integrates multiple criteria, ensuring routes are short and energy-efficient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    ROA-CONS: raccoon optimization job scheduling by Koohi, Sina Zangbari, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Ibragimov, Gafurjan

    Published 2021
    “…HPC’s job scheduling is intended to develop an operational strategy which utilises resources efficiently and avoids delays. …”
    Get full text
    Get full text
    Article
  16. 16

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation by Bahomaid, Ameen A., Alsewari, Abdulrahman A., Zamli, Kamal Z., Alsariera, Yazan A.

    Published 2018
    “…Furthermore, the efficiency and performance of the VS-MGS using MGA were assessed firstly by comparing its results with the original greedy algorithm results and thereafter benchmarked with the results of the existing VS CT strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  19. 19
  20. 20

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…In addition, one of the main challenges has been development of efficient algorithm for solving aforementioned model to find exact feasible optimal solution. …”
    Get full text
    Get full text
    Thesis