Search Results - (( java implementation modified algorithm ) OR ( knowledge types visualization algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adopting machine learning to automatically identify a suitable surgery type for refractive error patients by Mustafa Ali Malla, Al-Beak, Omar Hussien, Duaa Mowafaq Hameed, Al-Hatab, Marwa Mawfaq Mohamedsheet, Al-Nima, Raid Rafi Omar, Mohammed Sabah Jarjees, Al-Maqsood, Khalil A. K.

    Published 2024
    “…ML is dedicated to the advancement and use of algorithms that possess the capacity to acquire knowledge from data and enhance their predictive capabilities without explicit programming. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking by Ong, Chor Keat

    Published 2017
    “…Visual tracking has become one of the most important components in computer vision as the knowledge in this field can be applied into a wide range of applications in computer vision such as medical imaging, pattern recognition, video surveillance, industrial robot, computer-human interaction, etc. …”
    Get full text
    Get full text
    Monograph
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…In context of teaching programming, we feel that most of the teaching approaches only benefit the visual and auditory students even though many are among the kinaesthetic typed. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Development of a Prediction Algorithm using Boosted Decision Trees for Earlier Diagnoses on Obstructive Sleep Apnea by Sim, Doreen Ying Ying

    Published 2018
    “…This research develops a knowledge-based system by using computational intelligent approaches based on Boosting algorithms on decision trees augmented by pruning techniques and Association Rule Mining. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. ANN is a computer-based simulation of the living nervous system which works quite differently from conventional programming. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Application Of Bibliometric Analysis on Root Growth Algorithm by Tengku Malim Busu, Tengku Nurul Aimi Balqis, Ahmad Kamaruddin, Saadi, Ahad, Nor Aishah, Md Ghani, Nor Azura, Hamid, Hashibah

    Published 2024
    “…This article uses three types of software: Microsoft Excel, VOSviewer software, and Harzing’s Publish or Perish software to analyze the frequency, visualization mapping, and citation metrics analysis, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Out of five types of staining patterns nucleolar and centromere share similar visual appearance and the same is true to homogeneous, fine-speckled, coarse-speckled patterns. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Dynamic modelling of proton exchange membrane fuel cell system for electric bicycle / Azadeh Kheirandish by Azadeh, Kheirandish

    Published 2016
    “…On the other hand, the information of fuzzy cognitive map modeling is applicable for modification of neural networks structure for providing more accurate results based on the extracted knowledge from the cognitive map and visualization of the system’s performance.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Generalized Fuzzy Linguistic Bicubic B-Spline Surface Model for Uncertain Fuzzy Linguistic Data by Mohd Syafiq Bidin, Abd. Fatah Wahab, Mohammad Izat Emir Zulkifly, Rozaimi Zakaria

    Published 2022
    “…In addition, a numerical example of fuzzy linguistic data is considered at the end of this study to visualize the suggested model. Thus, the relation between the fuzzy linguistic data points can be analyzed to present another area of knowledge in which symmetry phenomena occur. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis