Search Results - (( java implementation modified algorithm ) OR ( pattern intention based algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2009
    “…Prediction of user future movements and intentions based on the users’ clickstream data is a main challenging problem in Web based recommendation systems. …”
    Get full text
    Get full text
    Article
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  8. 8

    WebPUM : a web-based recommendation system to predict user future movements. by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2010
    “…To effectively provide online prediction, we have developed a recommendation system called WebPUM, an action using Web usage mining system and propose a novel approach online prediction for classifying user navigation patterns to predict users’ future intentions. The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Software agent as an effective tool for managing the Internet of thing data complexity by Mustafa, M.B., Yusoof, M.A.M.

    Published 2017
    “…However, the key question is that, which data best describe the user’s intention to purchase. Many of the algorithms examine user’s past activities and traits to predict the buying intention. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Authenticating sensitive diacritical texts using residual, data representation and pattern matching methods / Saqib Iqbal Hakak by Saqib Iqbal , Hakak

    Published 2018
    “…The last method is based on the pattern matching approach, where given multiple pattern input is authenticated from a given text. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Brain computer interface based wheelchair for disable people using electroencephalography signal by Ibrahimy, Muhammad Ibn

    Published 2018
    “…However, an advanced and simple classification algorithm for motor imagery related BCI system has already been developed with Mahalanobis Discriminant Analysis (MDA) technique. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Classification of stock market index based on predictive fuzzy decision tree by Khokhar, Arashid Hafeez

    Published 2005
    “…In particular, predictive FDT algorithm is based on the concept of degree of importance of attribute contributing to the classification. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Brain computer interface based wheelchair for disable people using electroencephalography signal by Ibrahimy, Muhammad Ibn

    Published 2017
    “…However, an advanced and simple classification algorithm for motor imagery related BCI system has already been developed with Mahalanobis Discriminant Analysis (MDA) technique. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    The classification of motor imagery response: an accuracy enhancement through the ensemble of random subspace k-NN by Rashid, Mamunur, Bari, Bifta Sama, Hasan, Md Jahid, Mohd Azraai, Mohd Razman, Rabiu Muazu, Musa, Ahmad Fakhri, Ab. Nasir, Anwar, P. P. Abdul Majeed

    Published 2021
    “…The common spatial pattern (CSP) has been applied to extract the features from the MI response, and the effectiveness of random forest (RF)-based feature selection algorithm has also been investigated. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A practical and interactive web-based software for online Qur'anic Arabic learning by Abdullah, Matin Saad, Rahman, M.M. Hafizur, Pathan, Al-Sakib Khan, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…We discuss the design of different natural language processing algorithms for analyzing the Qur’anic corpus in order to identify and extract frequently occurring common language patterns to automate the production of educational material for the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    A practical and interactive web-based software for online Qur’anic Arabic learning by Abdullah, Matin Saad, Rahman, M.M. Hafizur, Pathan, Al-Sakib Khan, Alshaikhli, Imad Fakhri Taha

    Published 2017
    “…We discuss the design of different natural language processing algorithms for analyzing the Qur’anic corpus in order to identify and extract frequently occurring common language patterns to automate the production of educational material for the system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis