Search Results - (( java implementation modified algorithm ) OR ( knowledge among pattern algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- pattern algorithm »
- knowledge among »
- among pattern »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset
Published 2018“…This paper proposes IF-Postdiffset as a new variant in R-Eclat algorithm. This paper also highlights the performance of infrequent mining pattern from the transaction database among different variants of the R-Eclat algorithm regarding its execution time.…”
Get full text
Get full text
Article -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…An algorithm called Flex (Frequent lexicographic patterns) has been proposed in obtaining a good performance of searching li-equent patterns. …”
Get full text
Get full text
Thesis -
7
Analysis of K-Mean and X-Mean Clustering Algorithms Using Ontology-Based Dataset Filtering
Published 2021“…In the field of computer science, data mining facilitates the extraction of useful knowledge and patterns from a huge amount of data. …”
Get full text
Get full text
Get full text
Article -
8
Evaluation of fall detection classification approaches
Published 2012“…This paper presents the comparison of different machine learning classification algorithms using Waikato Environment for Knowledge Analysis (WEKA) platform for classifying falling patterns from ADL patterns. …”
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The knowledge that was inadequate among the respondents were knowledge on primary and secondary transmission of dengue fever, knowledge on possible breeding sites of dengue vectors and knowledge on the severity of dengue fever and vectors. …”
Get full text
Get full text
Thesis -
11
-
12
An efficient fuzzy C-least median clustering algorithm
Published 2021“…The outcomes demonstrate a clear improvement of our algorithm than existing FCM algorithm.…”
Get full text
Get full text
Get full text
Get full text
Article -
13
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
Get full text
Get full text
Get full text
Article -
14
A framework of modified adaptive neuro-fuzzy inference engine
Published 2012“…Neuro-fuzzy systems are globally employed for pattern recognition, industrial plant control, system predictions, modeling and other decision making purposes. …”
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Herb recognition for mobile apps / Jumriyanie Baba
Published 2017“…The mobile application is able to recognize the herbs type using the most suitable algorithm. In addition, this mobile application will also provide the information about the herbs for user's knowledge.…”
Get full text
Get full text
Thesis -
19
A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan
Published 2024“…This research also aims to present a reliable autonomous algorithm that minimizes the issues with localization and navigation skills among autistic people in a HBVE to improve their wayfinding and spatial knowledge. …”
Get full text
Get full text
Get full text
Thesis -
20
Improving named entity recognition accuracy of gene and protein in biomedical text
Published 2011“…In this study, to handle the above issues in recognizing gene and protein names, a statistical similarity measurement as a pattern matching function is proposed. Our approach is based on an assumption that a named entity occurs among a noun group which is extracted using Brill Part of Speech tagger. …”
Get full text
Get full text
Thesis
