Search Results - (( java implementation modified algorithm ) OR ( knowledge creating process algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- knowledge creating »
- process algorithm »
- creating process »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Cryptanalysis in cryptographic algorithm design
Published 2006“…The aim of this paper is to create awareness on the importance of cryptanalysis when designing cryptographic algorithms. …”
Get full text
Conference or Workshop Item -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
8
Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.]
Published 2023“…Data analysis revealed that 87% of students and 80% of teachers lacked knowledge and skills to create mathematical models and establish interdisciplinary connections. …”
Get full text
Get full text
Get full text
Article -
9
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…However, the important issue is how to measure the available bandwidth on an end-to-end overlay path without prior knowledge about the physical network. Over the last two decades, researchers have been trying to create algorithms to measure end-to-end available bandwidth and other bandwidth-related metrics accurately, quickly, and without affecting the traffic of the path. …”
Get full text
Get full text
Thesis -
10
Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar
Published 2012“…maybe he learns from past experience or new information he receives. The learning process creates knowledge that guides a person to make the decisions. …”
Get full text
Get full text
Research Reports -
11
-
12
Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel Babel Bank's Pagar Alam Branch
Published 2023“…In this research, a classifier algorithm was applied to create a prediction model to predict the customer before the lending application was used and process to pass the lending process in Bank Sumsel, branch Pagar Alam. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive firefly algorithm for hierarchical text clustering
Published 2016“…As search engine operates on Internet content that is constantly being updated, there is a need for a clustering algorithm that offers automatic grouping of items without prior knowledge on the collection. …”
Get full text
Get full text
Get full text
Thesis -
14
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
15
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
Get full text
Get full text
Thesis -
16
A novel association rule mining approach using TID intermediate itemset
Published 2018“…Designing an efficient association rule mining (ARM) algorithm for multilevel knowledge-based transactional databases that is appropriate for real-world deployments is of paramount concern. …”
Get full text
Get full text
Article -
17
Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini
Published 2023“…The system will begin to function by receiving real-time input of a sign language image. The YOLOv7 algorithm will process the image by detecting trained images in the input image. …”
Get full text
Get full text
Thesis -
18
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
19
Ontology enrichment with causation relations
Published 2014“…Ontology learning is considered a potential approach that can help to reduce the bottleneck of knowledge acquisition. However it suffers from a lack of standards to define concepts, besides the lack of fully automatic knowledge acquisition methods. …”
Get full text
Get full text
Get full text
Article -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article
