Search Results - (( java implementation modified algorithm ) OR ( pattern extraction within algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Finger Vein Recognition Using Pattern Map As Feature Extraction by Teoh, Saw Beng

    Published 2012
    “…Algorithms such as Gabor Filter, Local Line Binary Pattern (LLBP) and Principal Component Analysis (PCA) have been proposed in recent study to extract finger vein features. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…Algorithms have been developed for extracting these features after segmenting the head and the two hands. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Multispectral palm vein image fusion for contactless palm vein verification system by Soh, Shi Chuan

    Published 2018
    “…The result shows that SIFT algorithm achieved a better recognition rate and extract more information and matching pairs compared to SURF algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Acoustic echo cancellation using adaptive filter for Quranic accent signals by Kamarudin, Noraziahtulhidayu, Al Haddad, Syed Abdul Rahman, Basiron, Azli, Hassan Azhari, Rauf

    Published 2024
    “…AP indicates 93.9% for all of the classification algorithm in used, while for LMS and RLS the results are differed varies on different pattern classification algorithm stated whereby with LMS and PPCA classification, 96.9 % for accuracy and 84.8% accuracy for LMS and KNN. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…The second is to propose a hybrid MPPT algorithm based on modified P&O algorithm assisted by Extremum Seeking Control (ESC) approach, in order to maximize the extracted PV power under complex PSC. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhancement of filter design and EEG power ratio features in IQ pattern analysis / N. H. R. Azamin ...[et al.] by Azamin, N. H. R., Jahidin, A. H., Megat Ali, M. S. A., Taib, M. N.

    Published 2017
    “…As a result, the obtained features are less accurate due to the presence of spectral leakages within the pre-processing element. Hence, this paper propose an improved extraction algorithm based on the use of high-order equiripple filters. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Intelligent non-destructive classification of josapine pineapple maturity using artificial neural network by Nazriyah, Haji Che Zan @ Che Zain

    Published 2016
    “…ROI that has been identified lengthened for feature extraction on the skin color of pineapple. Statistical based features namely minimum, maximum, arithmetic average and standard deviation were extracted from each image channels within detected ROI to represent pineapple skin color's tendency and dispersion. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Automated detection of microaneurysm for fundus images by Norhasmira, Mohammad, Zaid, Omar, Eko, Supriyanto, Alexander, Dietzel, Jens, Haueisen

    Published 2016
    “…Texture energy filter is used to extract the true features where MA are identified. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16

    A study of customer retention and churn rate management through data mining and customer profiling of Malaysian mobile user by Ong, Derek Lai Teik *, Tan, Madeline Su Lin *, Andrews, Elizabeth *

    Published 2012
    “…This study aims to investigate the needs and wants of prepaid mobile service subscribers in Malaysia and identify usage patterns of industry churners, ultimately to offer the right product and value to target customers within a highly competitive market. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Urban green space spatio-temporal change influences on land surface temperature in Kuala Lumpur, Malaysia by Abu Kasim, Junainah

    Published 2020
    “…The study also applied land surface emissivity (LSE) algorithm to determine the LST value extracted from the Band 10 parameter of Landsat 8 OLI/TIRS. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    An integrated priority-based cell attenuation model for dynamic cell sizing by Amphawan, Angela, Omar, Mohd Nizam, Din, Roshidi

    Published 2012
    “…A new, robust integrated priority-based cell attenuation model for dynamic cell sizing is proposed and simulated using real mobile traffic data.The proposed model is an integration of two main components; the modified virtual community – parallel genetic algorithm (VC-PGA) cell priority selection module and the evolving fuzzy neural network (EFuNN) mobile traffic prediction module.The VC-PGA module controls the number of cell attenuations by ordering the priority for the attenuation of all cells based on the level of mobile level of mobile traffic within each cell.The EFuNN module predicts the traffic volume of a particular cell by extracting and inserting meaningful rules through incremental, supervised real-time learning.The EFuNN module is placed in each cell and the output, the predicted mobile traffic volume of the particular cell, is sent to local and virtual community servers in the VC-PGA module.The VC-PGA module then assigns priorities for the size attenuation of all cells within the network, based on the predicted mobile traffic levels from the EFuNN module at each cell.The performance of the proposed module was evaluated on five adjacent cells in Selangor, Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article