Search Results - (( java implementation modified algorithm ) OR ( knowledge level using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
6
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006Get full text
Get full text
Get full text
Article -
7
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
9
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
10
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
Get full text
Get full text
Thesis -
11
Near-sea-level langley calibration algorithm
Published 2014Get full text
Get full text
Get full text
Chapter In Book -
12
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006Get full text
Get full text
Conference or Workshop Item -
13
The Security Level Of Two Xored-based A5 Crypto System
Published 2024“…Five (5) statistical tests were used to test the strength of the algorithm. Both of the proposed modified XORed-based A5/1 algorithms successfully passed the five (5) statistical tests.…”
Article -
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham
Published 2017“…The examination questions will measure the understanding and knowledge level of students. However, there are differences in background among computer science diploma level students. …”
Get full text
Get full text
Thesis -
19
Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper
Published 2022“…However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
Get full text
Get full text
Article -
20
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…AI in KMS is used in the knowledge creation process. The Bert2Bert model is used in the multi-document summarisation of Indonesian-language knowledge in the knowledge combination process. …”
Get full text
Get full text
Get full text
Get full text
Thesis
