Search Results - (( java implementation modified algorithm ) OR ( knowledge using six algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…This automatic model selection algorithm is better than non-algorithm procedure which requires knowledge and extra time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System by AL-Khaleefa, Ahmed Salih, Mohd Riduan, Ahmad, Awang Md Isa, Azmi, AL-Saffar, Ahmed, Mohd Esa, Mona Riza, Malik, Reza Firsandaya

    Published 2019
    “…WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. Facilitating the use of WiFi for this purpose requires fingerprint formation and the implementation of a learning algorithm with the aim of using the fingerprint to determine locations. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design, optimization and fabrication of a climbing six articulated-wheeled robot using artificial evolution and 3D printing by Lim, Shun Hoe, Teo, Jason Tze Wi

    Published 2015
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    MFA-OSELM algorithm for WiFi-based indoor positioning system by Al-Khaleefa, Ahmed Salih, Mohd Riduan, Ahmad, Azmi Awang, Md Isa, Al-Saffar, Ahmed Ali Mohammed, Mona Riza, Mohd Esa, Reza Firsandaya, Malik

    Published 2019
    “…WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. Facilitating the use of WiFi for this purpose requires fingerprint formation and the implementation of a learning algorithm with the aim of using the fingerprint to determine locations. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Stage of maturity banana fruit classification using image processing / Nadia Kasim ... [et al.] by Kasim, Nadia, Zainol Abidin, Siti Nazifah, Abu Mangshor, Nur Nabilah, Mohamed Hamzah, Hazwa Hanim, Abd Rahim, Nurul Zahirah

    Published 2019
    “…This study attempted to propose a system that uses image processing to detect the maturity stage of banana based on its color and size using Support Vector Machine (SVM) learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Developing Android Application To Guide Lean Six Sigma PDCA Project by Ong, Sin Joo

    Published 2018
    “…The knowledge of Lean Six Sigma can be learned through online training, university course and company training program. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Ensemble-based machine learning algorithms for classifying breast tissue based on electrical impedance spectroscopy by Rahman, Sam Matiur, Ali, Md. Asraf, Altwijri, Omar, Alqahtani, Mahdi, Ahmed, Nasim, Ahamed, Nizam Uddin

    Published 2020
    “…., machine learning and deep learning) in medical science is becoming increasingly important for intelligently transforming all available information into valuable knowledge. Therefore, we aimed to classify six classes of freshly excised tissues from a set of electrical impedance measurement variables using five ensemble-based machine learning (ML) algorithms, namely, the random forest (RF), extremely randomized trees (ERT), decision tree (DT), gradient boosting tree (GBT) and AdaBoost (Adaptive Boosting) (ADB) algorithms, which can be subcategorized as bagging and boosting methods. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Feasibility study concerning the use of reasoning technique in semantic reasoners by Ting, Mary, Abdul Kadir, Rabiah, Tengku Sembok, Tengku Mohd, Ahmad, Fatimah, Azman, Azreen

    Published 2014
    “…Inference engine plays an important role in knowledge-based system, where it is used to perform reasoning when queries are entered. …”
    Get full text
    Conference or Workshop Item
  15. 15

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…Two of the datasets were then chosen for further experiment on the scalability of the algorithms by increasing their size of transactions up to six times. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Automatic design, optimization and In-Situ Fabrication of Heterogeneous Swarm Robot bodies using 3-D printing and multi-objective evolutionary algorithms by Teo, Jason Tze Wi, Johnny Koh, Chin, Kim On, Chua, Bih Lii, Willey Liew, Noor Ajian Mohd. Lair, Lim, Shun Hoe

    Published 2012
    “…In this research, an artificial evolution approach utilizing Single-Objective Evolutionary Algorithm (SOEA) and Multi-Objective Evolutionary Algorithm (MOEA) respectively are investigated in the automatic design and optimization of the morphology of a Six Articulated-Wheeled Robot (SAWR) with climbing ability. …”
    Get full text
    Get full text
    Research Report
  18. 18

    A Model Development And Comparison Study On The Microwave Remote Sensing Of Snow Medium Using A Coupled Finite Element Method And Method Of Moment, And The Relaxed Hierarchical Equ... by Hamsalekha, Kumaresan

    Published 2022
    “…These theoretical models consist of six shapes of scatterers which characterize the ice particles in the snow medium. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Coronary artery segmentation in angiograms with pattern recognition techniques - a survey by Tayebi, Rohollah Moosavi, Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Kadiman, Suhaini, Abdullah, Lilly Nurliyana, Mazaheri, Samaneh

    Published 2013
    “…Medical image processing is nowadays one of the best tools to make an informative model from a raw image of each part of the body, and segmentation is the most important step in which used to extract significant features. Coronary artery segmentation algorithm in angiograms is a fundamental component of each cardiac image processing system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors by Lateef, Saheed Ademola

    Published 2017
    “…(PLS-SEM)version 3.2.3). Six hypotheses are developed in the study. Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
    Get full text
    Get full text
    Get full text
    Thesis