Search Results - (( developing feature conversion algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score by Mirza Rizwan, Sajid

    Published 2021
    “…Further, it focuses on the development of various forms of local risk prediction models and simple heart risk scores using non-laboratory features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    VOICE MODIFICATION USING DIGITAL TECHNOLOGY by Nik Mohd Naaim, Nik Najiha Wahida

    Published 2004
    “…The project's major activities are to develop programs using MATLAB, that enable speech signal recording, analysis, synthesis, modification, and conversion. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Teaching and learning via chatbots with immersive and machine learning capabilities by Nantha Kumar Subramaniam

    Published 2019
    “…Chatbot is a computer program that simulates human conversation through voice commands or text chats or both. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  12. 12

    An adaptive face recognition under constrained environment for smartphone database by Hassan, Noor Amjed

    Published 2018
    “…The next objective is to enhance the appearance of face features under various illumination conditions by converting an image into a binary image using a new columnar binary conversion method considering the robustness and strong discriminative power of binary features. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…On the other hand, a random key is used to choose the frames to be watermarked to increase the security level of the algorithm and discourage piracy. The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Automate customer support handling E-Commerce enquiry using ChatGPT by Teo, Wen Jin

    Published 2024
    “…The automated summarization feature streamlines human agents' tasks by summarizing the entire conversations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Integrated PWM solar charge controller and DCDC converter using fixed-frequency current control mode for reducing selfpower consumption of off-grid solar home system / Mohammad Sha... by Islam, Mohammad Shariful

    Published 2024
    “…Key findings highlight enhanced controller features with essential safety measures, the development of an integrated controller, and a notable decrease in self-power consumption through innovative push-button switch mechanisms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Impact of optimizer on the MLP-based models for student performance classification by Osman, Fairul Nazmie, Abdul Aziz, Mohd Azri, Mohd Yassin, Ihsan, Taib, Mohd Nasir

    Published 2025
    “…Recursive Feature Elimination (RFE) was employed to select the most salient features, thereby reducing model complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    StockMaster simulator / Nor Hamiza Mohd Noor ... [et al.] by Mohd Noor, Nor Hamiza, Asbullah, Nurul Farzana, Hairi Annuar, Syazana Ezzati, Tujang, Anatasha Alfiera, Muhammad Rasli, Irdina Hani

    Published 2023
    “…Real-time market data, trading algorithms, and interactive features will make it more engaging. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Investigation of machine learning models in predicting compressive strength for ultra-high-performance geopolymer concrete: A comparative study by Abdellatief M., Hassan Y.M., Elnabwy M.T., Wong L.S., Chin R.J., Mo K.H.

    Published 2025
    “…Ultra-high-performance geopolymer concrete (UHPGC) is a new category of traditional UHPC developed to meet the desire for ultra-high-strength and green building materials. …”
    Article