Search Results - (( java implementation modified algorithm ) OR ( knowledge implementation success algorithm ))
Search alternatives:
- knowledge implementation »
- implementation modified »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008“…This project is the new idea to implement the Knowledge Management by applying the concept of Knowledge Map and Social Network Map, which are the basic implementation of Knowledge Management, with Artificial Neural Network (ANN) Algorithm ofArtificial Intelligence System. …”
Get full text
Get full text
Final Year Project -
7
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
Get full text
Get full text
Thesis -
8
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
Get full text
Get full text
Thesis -
9
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…This algorithm has been tested and implemented successfully via a dual beam optical scanning system.…”
Get full text
Get full text
Thesis -
10
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…Bayesian networks have been successfully implemented as classi¯ers in many research and industrial areas and they are used as models for representing un- certainty in knowledge domains. …”
Get full text
Get full text
Thesis -
13
-
14
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The implemented algorithm to perform such operation was far more efficient, faster and accurate as compared to conventional methods. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Segmenting microcalcifications using enhanced distance active contour (EDAC) / Siti Salmah Yasiran
Published 2010“…Results obtained show that the EDAC has successfully reduced the processing time. In addition to that, the boundaries of microcalcifications have been successfully segmented by the EDAC. …”
Get full text
Get full text
Thesis -
16
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2006“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. © 2006 Asian Network for Scientific Information.…”
Get full text
Get full text
Get full text
Article -
17
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. � 2006 Asian Network for Scientific Information.…”
Article -
18
Design, development and performance optimization of a new artificial intelligent controlled multiple-beam optical scanning module
Published 2023“…This algorithm has been tested and implemented successfully via a dual-beam optical scanning module. � 2006 Asian Network for Scientific Information.…”
Article -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…With their efficient training algorithm (Baum-Welch and Viterbi/Segmental K-mean) and recognition algorithm (Viterbi), as well as it’s modeling flexibility in model topology, observation probability distribution, representation of speech unit and other knowledge sources, HMM has been successfully applied in solving various tasks in this thesis. …”
Get full text
Get full text
Get full text
Thesis
