Search Results - (( java implementation modified algorithm ) OR ( framework implementing extraction algorithm ))
Search alternatives:
- implementation modified »
- implementing extraction »
- framework implementing »
- extraction algorithm »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Genetic algorithm based ensemble framework for sentiment analysis
Published 2018“…The objectives of this work include to investigate the effects of diversifying the feature selection methods on the sentiment analysis results and estimate suitable thresholds to apply, to investigate the effects of diversifying the feature extraction methods on the sentiment analysis results and lastly to implement and evaluate the performance of a multi-layer ensemble framework with optimization algorithm to produce accurate results. …”
Get full text
Get full text
Thesis -
3
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The framework is used to increase the implementation performance of quantum algorithms. …”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
A Telemedicine Tool Framework For Lung Sounds Classification Using Ensemble Classifier Algorithms
Published 2020“…The overall classification accuracy for the Improved Random Forest algorithm has 99.04%. The telemedicine framework was implemented with the Improved Random Forest algorithm. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…Swarm intelligence (SI) algorithm is implemented because there are lot of previous works which prove that the SI is good for segmentation and classification. …”
Get full text
Get full text
Thesis -
10
-
11
A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS
Published 2019Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
13
Ontology enrichment with causation relations
Published 2014“…The results show a good performance and the implemented framework cut off many steps of the usual process to produce the final results.…”
Get full text
Get full text
Get full text
Article -
14
Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun
Published 2025“…In the design and implementation phases, TF-IDF was considered in cleaning and preparing the reviews for application, while the construction of a sentiment analysis model was implemented through the use of the Multinomial Naive Bayes algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
Design and implementation of multimedia digital matrix system
Published 2005“…This feature is valuable to simplify the process of frequency synthesis. The algorithm is implemented in programmable logic platform to synchronize multiple of audio PCM channels through an optical fiber. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Image Stitching Of Aerial Footage
Published 2021“…The proposed algorithm extracts the frames of the aerial footage and undistorts the bird-eye-effect of the images to remove the noises. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Development Of Water Quality Index Prediction Model For Penang Rivers Using Artificial Neural Network
Published 2021“…As for the implementation of MPCA in feature extraction for BOD and COD, there were only 4 inputs required to explain at least 99.999% variability for both analyses. …”
Get full text
Get full text
Monograph
