Search Results - (( java implementation modified algorithm ) OR ( data competency based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…In the experimental phase, academic leadership competency data were collected from a selected higher learning institution as training data-set based on 10-fold cross validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7
  8. 8

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…There are several stages in developing a KMS, namely compiling data requirements for the four lecturer competencies: pedagogical competency, professional competency, personality competency, and social competency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Statistical process control for failure crushing time data using competing risks model. by Elfaki, F.A.M., Daud, Isa, Ibrahim, Noor Akma, Daud, J., Azram, M., Usman, M.

    Published 2011
    “…This paper describes a Statistical Process Control (SPC) for failure crushing time data using competing risks model. The model is based on the widely known proportional hazard regression model for a variety of censoring. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Statistical process control for failure crushing time data using competing risks model by Elfaki, Faiz Ahmed Mohamed, Daoud, Jamal Ibrahim, Azram, Mohammad, Daud, Isa, Ibrahim, N.A., Usman, Mustofa

    Published 2011
    “…This paper describes a Statistical Process Control (SPC) for failure crushing time data using competing risks model. The model is based on the widely known proportional hazard regression model for a variety of censoring. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…Originality/value – A modification of the two competing risk models has mostly been applied in failure time data and simulation data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Cutpoint determination methods in competing risks subdistribution model by Noor Akma Ibrahim, Abdul Kudus, Isa Daud, Mohd. Rizam Abu Bakar

    Published 2009
    “…Five cutpoint determination methods are developed based on regression of competing risks subdistribution. …”
    Get full text
    Get full text
    Article
  14. 14

    A Penalty-Based Genetic Algorithm For The Composite Saas Placement Problem In The Cloud by Mohd Yusoh, Zeratul Izzah, Tong, Maolin

    Published 2010
    “…This paper proposes a penalty-based genetic algorithm (GA) to the composite SaaS placement problem in the Cloud. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cutpoint determination methods in competing risks subdistribution model by Ibrahim, Noor Akma, Kudus, Abdul, Daud, Isa, Abu Bakar, Mohd Rizam

    Published 2009
    “…Five cutpoint determination methods are developed based on regression of competing risks subdistribution. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih by Hashim, Asman

    Published 2001
    “…Artificial Neural Network is one of the branches of Artificial Intelligence which is utilized for the purpose of classification and prediction based on data in hand. The purpose of the study is to develop a web-based self assessment information system that can be used to obtain a model for prediction of information technology competency among teacher trainees in teaching institutes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…A good model is a model that encapsulates the initial process and therefore represents a close estimate to the true model that generated the data.However, whenever there is more than one model to be considered, selection decision needs to be based on its competence to generalize, which is defined as a model’s ability to fit not only current data but also to forecast future data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…By using each training data and testing data as many as 30 data. The results of the study were conducted, based on the accuracy of SVM, which was 82.33% and C4.5 89.29 %%. …”
    Get full text
    Get full text
    Conference or Workshop Item