Search Results - (( developing generating query algorithm ) OR ( java application using algorithm ))
Search alternatives:
- developing generating »
- generating query »
- java application »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The focus of this study is to propose an enhancement on memory consumption by reducing the number of candidates generated for the existing FLEX algorithm which will reduce the amount of memory needed to execute the algorithm. …”
Get full text
Get full text
Thesis -
2
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
Get full text
Get full text
Thesis -
3
Graphical web based tool for generating query from star schema
Published 2009“…This paper presents the development of a graphical SQL query tool that allows novice and non-technical users to navigate through database tables and generate their own queries.The tool enables the query output to be presented in graphical and tabular forms, which can help users, especially top management in better understanding and interpreting query results.The algorithms to construct complex SQL query from star schema in databases is also presented.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Secondly, a XML Keyword Query Structuring System (XKQSS) has been developed to relegate the task of generating structured queries from a user to itself while retaining the simple keyword search query interface that allows users to submit a schema independent keyword query. …”
Get full text
Get full text
Get full text
Thesis -
5
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
6
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012Get full text
Get full text
Get full text
Article -
7
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…In addition, dummy queries are generated to protect users from unusual situations. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…In addition, dummy queries are generated to protect users from unusual situations. …”
Get full text
Get full text
Article -
9
Semantic query translation for Quran content retrieval / Mohd Amin Mohd Yunus
Published 2014“…The specific objectives of the study are i) to develop algorithm of query expansion based on stemming, semantic and translation query in cross language Quranic retrieval, ii) to develop a prototype of cross language Quranic retrieval system for Malay, English and Arabic based on Stemmed Semantic Translated Query (StSTQ), iii) to evaluate the performance of the prototype system of the cross language Quranic retrieval. …”
Get full text
Get full text
Thesis -
10
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…The objectives of this research are: (i) formulate plan generator algorithms for join query processing on the basis of the previous research. …”
Get full text
Get full text
Thesis -
11
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
Get full text
Get full text
Get full text
Thesis -
12
Skyline queries on data with uncertain dimensions for efficient computation
Published 2018“…Skyline query is crucial in multi-criteria decision making applications particularly in applications that generate uncertain data. …”
Get full text
Get full text
Thesis -
13
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
14
Article recommendation system using content-based filtering / Muhammad Hazrul Afiq Kamaruddin
Published 2024“…In this study, article recommendation system using content-based filtering was designed and developed to address the challenges. The algorithm used is able to generate relevant article recommendations based on the content of the article. …”
Get full text
Get full text
Thesis -
15
-
16
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
17
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…The generated target queries are required to be ranked so that the results are reported in order to their relevance to the user query. …”
Get full text
Get full text
Thesis -
18
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
Get full text
Get full text
Thesis -
19
Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali
Published 2013“…Every successful branch is translated into a JTMS network that links the facts used in the proof branch to the answer generated by that branch. When the same query is re-evaluated, the query engine collects the valid answers for the query at that moment and returns them by using the cached proof structure for the query. …”
Get full text
Get full text
Get full text
Thesis -
20
