Search Results - (( java implementation modified algorithm ) OR ( knowledge work normalization algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…But all the clustering tool available are not suitable enough for a normal people that does not have expert knowledge in this field. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Citation Index Journal
  10. 10
  11. 11

    Optimization of neural network architecture using genetic algorithm for load forecasting by Islam, B.U., Baharudin, Z., Raza, M.Q., Nallagownden, P.

    Published 2014
    “…The network structures are normally selected on the basis of the developer's prior knowledge or hit and trial approach is used for this purpose. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm by Goay, Chan Hong

    Published 2019
    “…Besides that, the use of the prior knowledge input neural network (PKI-ANN) and the prior knowledge input difference neural network (PKID-ANN) for the modeling of high dimensional SI problem is proposed. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining by H’ng, Choo Wooi

    Published 2019
    “…The recorded data were screened on data normalization while the outliers were discarded prior to regression analysis aided by the Waikato Environment for Knowledge Analysis (WEKA) tool. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Computerized Maintenance Management System for Food Processing Industries by M.A., Burhanuddin, A.R., Ahmad, M.I., Desa, M.Y., Zeratul

    Published 2007
    “…Breakdown define as total amount of time the equipment would normally be out of operation from the moment it fails until the moment it is fully repaired and operational. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
    Get full text
    Get full text
    Thesis