Search Results - (( java implementation modified algorithm ) OR ( knowledge creating selection algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fuzzy genetic algorithms for combinatorial optimisation problems by Varnamkhasti, Mohammad Jalali

    Published 2012
    “…The second technique focuses on controlling the GA parameters by applying the FLC, thus creating a new variant of GA called Fuzzy Genetic Algorithm (FGA). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Personality prediction using Random Forest algorithm / Wan Abdul Qayyum Abdul Wahab by Abdul Wahab, Wan Abdul Qayyum

    Published 2023
    “…The research effort attempted to create a personality prediction system based on the Random Forest algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Feature selection for Malaysian medicinal plant leaf shape identification and classification by Sainin, Mohd Shamrie, Alfred, Rayner

    Published 2014
    “…Malaysian medicinal plants may be abundant natural resources but there has not been much research done on preserving the knowledge of these medicinal plants which enables general public to know the leaf using computing capability.Therefore, in this preliminary study, a novel framework in order to identify and classify tropical medicinal plants in Malaysia based on the extracted patterns from the leaf is presented.The extracted patterns from medicinal plant leaf are obtained based on several angle features.However, the extracted features create quite large number of attributes (features), thus degrade the performance most of the classifiers.Thus, a feature selection is applied to leaf data and to investigate whether the performance of a classifier can be improved.Wrapper based genetic algorithm (GA) feature selection is used to select the features and the ensemble classifier called Direct Ensemble Classifier for Imbalanced Multiclass Learning (DECIML) is used as a classifier.The performance of the feature selection is compared with two feature selections from Weka.In the experiment, five species of Malaysian medicinal plants are identified and classified in which will be represented by using 65 images.This study is important in order to assist local community to utilize the knowledge and application of Malaysian medicinal plants for future generation.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim by Halim, Zulkifli

    Published 2023
    “…Through the automated model selection, 176 models are created across the experiment settings. …”
    Get full text
    Get full text
    Thesis
  12. 12

    CSC099: Foundation Computing II / Centre of Foundation Studies by UiTM, Centre of Foundation Studies

    Published 2022
    “…This course introduces basic computer programming algorithm, problem solving, structured programming language, selection structure, repetition structure, function and array. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  13. 13

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…Then, from the model developed, a formulation was created based on the problem of the maintenance schedule proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Since there is no study has tried to create an algorithm that can customize tag cloud visual properties based on personality traits. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Fuzzy logic controller for an automatic car gearbox shifting by Norafiza, Mohd Hassim

    Published 2009
    “…As a result, the GUI gives the correct gear selection based on the fuzzy logic algorithms that has been implemented in the programming part before. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Determining Intermediary Closely Related Languages to Find a Mediator for Intertribal Conflict Resolution by Nasution, A.H., Fitri, S.E., Saian, R., Monika, W., Badruddin, N.

    Published 2022
    “…To address this problem, we aim to find intermediary closely related languages from a language similarity knowledge graph using the best-performing pathfinding algorithms. …”
    Get full text
    Get full text
    Article
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    RSSI Fingerprinting Approach for Location-Based Services by Abd Rashid, Mohd Juzaili

    Published 2006
    “…In order to performthis project, I will create a simulation whereby I will select one area probably my hostel house to study the problem of localization. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Adopting acknowledgment bitmap as an implicit indicator of the IEEE802.11n wireless network state by Saif, Anwar, Othman, Mohamed

    Published 2015
    “…However sending a large number of frames in one aggregation frame in an error-prone environment will result in massive frame loss and retransmission. Thus a prior knowledge about the state of the channel will help in selecting the proper aggregation size that would utilize the channel bandwidth and improve the system performance. …”
    Get full text
    Get full text
    Get full text
    Article