Search Results - (( java implementation modified algorithm ) OR ( consumer intention based algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- consumer intention »
- intention based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm
Published 2024“…In this context, it has become an important topic to study the relationship between the authenticity of online CSR communication messages and consumers’ purchase intentions. This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
Get full text
Get full text
Article -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The purpose of this study is to understand consumers’ behavior on their intention to use e-money mobile.The study of the intention to use e-money mobile is still at the early stage in payment transaction. …”
Get full text
Get full text
Get full text
Thesis -
7
Power system intentional islanding for different contingency scenarios using discrete optimization technique
Published 2023“…In addition, the results of the case studies (with critical line outage) showed that the MDEP algorithm was able to obtain the optimal intentional islanding strategy with minimal power flow disruption.…”
text::Thesis -
8
Modeling purchase intention towards edible bird's nest products among Malaysians
Published 2018“…Despite an ever-growing number of EBN products and options available in the market, there are still fewer purchasers among Malaysian consumers as compared to other countries. This study aims to determine factors that influence consumers’ intention in purchasing EBN products. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…However, the key question is that, which data best describe the user’s intention to purchase. Many of the algorithms examine user’s past activities and traits to predict the buying intention. …”
Get full text
Get full text
Conference or Workshop Item -
11
Electroencephalogram signal interpretation system for mobile robot
Published 2013“…After 30 GA runs, the optimal four sets of electrodes are chosen based on their coefficient of determination or r² values, where higher values contributes to higher repetition rates. …”
Get full text
Get full text
Thesis -
12
Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack
Published 2008“…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
Get full text
Get full text
Thesis -
13
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
14
The study of factors affecting behaviour digital marketing among University Malaysia Kelantan student’s
Published 2024“…The data analysis was used are descriptive analysis, a reliability and validity test, and hypotheses testing followed by PLS-SEM algorithm and Bootstrapping. The Originality of the study, an experience study based on the behavior of Malaysia Kelantan University students in digital marketing. …”
Get full text
Get full text
Undergraduate Final Project Report -
15
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
16
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
17
Mapping of the air pollution dispersion in the Klang Valley using remote sensing and GIS techniques / Suharti Ismail
Published 2007“…The final results are maps showing the air pollution dispersion in the atmosphere based on satellite-derived aerosol values.…”
Get full text
Get full text
Thesis -
18
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
Get full text
Get full text
Thesis
