Search Results - (( java implementation modified algorithm ) OR ( knowledge reading process algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Automation of Quranic Readings Gathering Process by AbuSafiya, Majed

    Published 2021
    “…In this paper, this process was algorithmically formulated and a developed software system was presented to automate this process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Multiple case-based retrieval for university course timetabling problem by Hong, Siaw Theng

    Published 2016
    “…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. The algorithm is combining separated distinct processes, with the combination of different functionalities: Prioritized Attributes, Frequency Grouping, and Value Difference Measurement. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation by Yousfi, Bilal, Zeki, Akram M.

    Published 2017
    “…In the process of learning Quran, reciters should have the provisions of Tajweed rules when reading the Quran. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin by Kamaruddin, Zunnajah

    Published 2005
    “…Therefore, it is needed to be read properly so the meaning of the reading is correct. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Performance analysis of bacterial genome assemblers using illumina next generation sequencing data / Nur ‘ Ain Mohd Ishak by Nur ‘ Ain , Mohd Ishak

    Published 2020
    “…De Bruijn graph is one of the assembly algorithms that are widely used for short reads sequences produced from NGS platforms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A study on matrix factorization and its applications by Tang, Adrian Wen Kai

    Published 2021
    “…In order to carry out the project, we first read intensively on other research papers to increase the knowledge related to SVD and NMF. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Diagnostic And Classification System For Kids With Learning Disabilities by Rehman, Ullah Khan, Julia Ai Cheng, Lee, Yin, Bee Oon

    Published 2017
    “…Most experts are using manual techniques to diagnose dyslexia. Machine learning algorithms are capable enough to learn the knowledge of experts and thus, automation of the diagnosis process is possible. …”
    Get full text
    Get full text
    Proceeding
  13. 13

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Another downside is test results being subject to change with experts knowledge and years of experience. These factors lead to low accuracy and it becomes a lengthy process due to large number of images. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    A hybrid approach to improve recommendation system in E-tourism by Rahman M.M., Zaki Z.B.M., Alwi N.H.B.M., Monirul Islam M.

    Published 2024
    conference output::conference proceedings::conference paper
  15. 15

    Obstacle Avoidance of a Mobile Robot Using Fuzzy Logic Control by Eshtawie, Mohamed Al-Mahdi

    Published 1999
    “…The navigation algorithm is proposed for static obstacles and with no priori knowledge about the environment. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…The BroIDS processes the existing datasets and generates various log files such as HTTP which is used in this research while Flume component reads and tracks the incoming packet data blocks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Binary vote assignment on grid quorum replication technique with association rule by Ainul Azila, Che Fauzi

    Published 2018
    “…Furthermore, these techniques also do not consider the correlation between data during the fragmentation process. The knowledge about data correlation can be extracted from historical data using techniques of the data mining field. …”
    Get full text
    Get full text
    Thesis
  20. 20