Search Results - (( java implementation modified algorithm ) OR ( basic normalization techniques algorithm ))
Search alternatives:
- normalization techniques »
- implementation modified »
- java implementation »
- basic normalization »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Clustering is an unsupervised classification method with aim of partitioning, where objects in the same cluster are similar, and objects belong to different clusters vary significantly, with respect to their attributes. The K-means algorithm is a famous and fast technique in non-hierarchical cluster algorithms. …”
Get full text
Get full text
Get full text
Article -
3
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…It terms of security, with the combination of Distorted DC permutation (DDP), it was considered to be having medium security based on some basic attack analysis that was carried out. It is also shown that this technique is fully format compliance as most of other techniques do. …”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
Get full text
Get full text
Thesis -
9
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
10
-
11
Text classification using Naive Bayes: An experiment to conference paper
Published 2005“…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Agent-based extraction algorithm for computational problem solving
Published 2015“…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
Get full text
Get full text
Thesis -
13
Neural network paradigm for classification of defects on PCB
Published 2003“…The algorithms to segment the image into basic primitive patterns, enclosing the primitive patterns, patterns assignment, patterns normalization, and classification have been developed based on binary morphological image processing and Learning Vector Quantization (LVQ) neural network. …”
Get full text
Get full text
Article -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Early detection of spots high water saturation for landslide prediction using thermal imaging analysis
“…The result reveals that HSV color space technique provides the best segmentation with average misclassification error equals to 0.00165 for abnormal images, 0.0061 for normal images and 0.0014 for combination of abnormal and normal images. …”
Get full text
Get full text
Research Report -
16
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…The aim of this research is to develop a new automated technique for an optical tactile sensor in measuring normal and shear force for surface characterization. …”
Get full text
Get full text
Thesis -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Machine learning as new approach for predicting of maxillary sinus volume, a sexual dimorphic study
Published 2023“…In this retrospective study, we used data from 150 patients with normal maxillary sinuses to train and evaluate a Python ML algorithm for its ability to predict MSV from basic patient demographics (age, gender) and sinus length measurements in three directions (anteroposterior, mediolateral, and superoinferior). …”
Get full text
Get full text
Get full text
Article -
20
Early detection of high water saturation spots for landslide prediction using thermal image analysis
Published 2018“…The result reveals that HSV color space technique provides the best segmentation with average misclassification error equals to 0.00165 for abnormal images, 0.0061 for normal images and 0.0014 for combination of abnormal and normal images. …”
Get full text
Get full text
Thesis
