Search Results - (( java implementation modified algorithm ) OR ( pattern interaction model algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- pattern interaction »
- interaction model »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Prime-based method for interactive mining of frequent patterns
Published 2010“…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
Get full text
Get full text
Thesis -
3
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Pattern classification of human interactions from videos / Muhsin Abdul Mohammed
Published 2018“…The objective of this research project is to build a machine learning model to classify human interactions from a stream of video. …”
Get full text
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
9
Coronary artery segmentation in angiograms with pattern recognition techniques - a survey
Published 2013“…In this paper, we have divided these algorithms into five major classes and propose a survey for the main class, pattern recognition, which is a famous technique in this manner. …”
Get full text
Get full text
Conference or Workshop Item -
10
Agent-Based Model of Virtual Community Cohesion (S/O: 13443)
Published 2021“…In achieving the aim of this study, an agent-based model (ABM) was applied to help understand the interactions between people (agents) who, in turn, influence one another. …”
Get full text
Get full text
Monograph -
11
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…The model of Immune Network Algorithm used in this study is aiNet. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Simulation model algorithm for pre-hospital emergency care (PHEC) volunteers in Indonesia
Published 2018“…Algorithm models for PHEC simulation have some strengths in real setting and effective interactive learning to evaluate the capabilities of first responders in managing pre-hospital emergency, and improve problem-solving skills, as well as their performance in such aspects as skill, knowledge, and attitude.…”
Get full text
Get full text
Get full text
Article -
13
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2023“…The model of Immune Network Algorithm used in this study is aiNet. …”
Article -
14
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2015“…The model of Immune Network Algorithm used in this study is aiNet. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011“…Vision-based hand posture detection and tracking is an important issue for Human to Computer Interaction applications. The performance of recognition system fIrst depends on the process of getting effIcient features to represent pattern characteristics [1]. …”
Get full text
Get full text
Get full text
Book Chapter -
17
-
18
Sales prediction of religious product and services of Mutawwif Haramain Travel & Tours using predictive analytics
Published 2025“…This research develops a predictive model for sales prediction at Mutawwif Haramain Travel & Tours, utilizing machine learning algorithms, specifically Decision Tree, Random Forest, and Naive Bayes, to uncover patterns in customer behavior and seasonal demand. …”
Get full text
Get full text
Student Project -
19
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
20
Hybrid Artificial Bees Colony algorithms for optimizing carbon nanotubes characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Thesis
