Search Results - (( java implementation modified algorithm ) OR ( knowledge identification process algorithm ))
Search alternatives:
- knowledge identification »
- implementation modified »
- identification process »
- java implementation »
- process algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. …”
Get full text
Get full text
Article -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…This research presents an efficient way to facilitate the hearing loss symptoms diagnosis process by designing a symptoms identification model that efficiently identify hearing loss symptoms based on air and bone conduction pure-tone audiometry data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
9
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
Article -
10
Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
11
Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
12
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
13
-
14
Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin
Published 2005“…Images are used as samples to be processed for the used of classification. In order to have a system which has an ability to learn, back-propagation learning algorithm is used. …”
Get full text
Get full text
Thesis -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Secondly, the feature transformation, a knowledge-based method, is utilized to pre-process the fault data. …”
Get full text
Get full text
Get full text
Article -
17
A framework for malware identification based on behavior
Published 2012“…These three major components are integrated together as a cohesive unit for malware identification through knowledge storage. The experiment on the framework shows that as compared to several other related works, this framework provides better solutions on malware behavior definition, prediction and target classification. …”
Get full text
Get full text
Thesis -
18
-
19
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…However, not much attention has been paid to issues related to skyline query processing over knowledge of large-scale incomplete graph databases. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
Get full text
Get full text
Get full text
Article
