Search Results - (( developing effective efficient algorithm ) OR ( java extraction process algorithm ))

Search alternatives:

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  5. 5

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Research Report
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Studies have shown how user perception can have a strong influence on policies and decision-making processes in a place, society, and nation. This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…Image preprocessing and image extraction are done by using MATLAB. The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Developing A Prediction Tool To Improve The Shading Efficiency Of The Pedestrian Zones by Khudhayer, Wael A.

    Published 2020
    “…Then ECOTECT software has utilized to validate the effectiveness of the developed prediction tool for evaluating and improving the shading efficiency in the pedestrian zone. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A fast and efficient crosstalk-free algorithm for routing in optical multistage interconnection networks by Raja Mohd Auzar, Tengku Dian Shahida, Othman, Mohamed, Abdullah, Mohamad Khazani

    Published 2008
    “…To evaluate the performance of the new algorithm, a crosstalk-free version of the original ZeroXY algorithm is developed extended from the Improved ZeroXY algorithm, called the Modified ZeroXY algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Development of indexer considering tag weighting for XML document / Masliana Wahid @ Buang by Wahid @ Buang, Masliana

    Published 2005
    “…This research is concerns to develop a prototype for indexing algorithm considering tag weighting for the XML document and also to test the indexer with the existing document, hi order to perform efficient retrieval on documents, appropriate index structure or algorithm must be used which include the structural information. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed such as NIST Statistical Test, avalanche effect, cryptanalysis and efficiency to justify that it is a secure block cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2011
    “…In addition, to evaluate the effect of using the AIMD algorithm after its development to measure the efficiency and fairness and find new enhancement results for our approach, which named as the New-AIMD algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improving the efficiency of thermoelectric generator using perturb and observe MPPT algorithm by Nurul Izzah Izzati Zaihan, Tengku Norliza Tengku Mohamad, Fakroul Ridzuan Hashim

    Published 2024
    “…The performance of the system utilizing the P&O based MPPT technique is compared to the system without MPPT under the same operating conditions, highlighting the significant of MPPT in enhancing TEG efficiency. The results demonstrate that the P&O algorithm effective increases the efficiency of MPPT in TEG systems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Multi-Objective Optimal Energy Management of Nanogrid Using Improved Pelican Optimization Algorithm by Jamal S., Pasupuleti J., Rahmat N.A., Tan N.M.L.

    Published 2025
    “…The development of efficient energy management for nanogrid (NG) systems, while reducing both the carbon dioxide (CO2) emissions and power generation cost, is achievable through the effective utilization of available energy sources. …”
    Article
  20. 20

    Intelligent multi-objective control and management for smart energy efficient buildings by Shaikh, P.H., Nor, N.B.M., Nallagownden, P., Elamvazuthi, I., Ibrahim, T.

    Published 2016
    “…Building energy management has been primarily associated with development and implementation of an efficient control scheme. …”
    Get full text
    Get full text
    Article