Search Results - (( java implementation modified algorithm ) OR ( pattern selection research algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Danger theory inspired artificial immune system for pattern recognition by Chung Seng Kheau, Rayner Alfred, Lau, Hui Keng, Jason Teo, Mohd. Hanafi Ahmad Hijazi, Nurul'alam Mohd. Yaakub

    Published 2007
    “…Based on ongoing initiatives in outlining OT algorithm, this research evaluates the performance of OT against NS algorithm within pattern recognition domain. …”
    Get full text
    Get full text
    Research Report
  7. 7

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun by Harun, Hazaruddin

    Published 2015
    “…Particle Swarm Optimisation (PSG) was selected as the base algorithm that needs improvement and integration with other techniques. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control by Mohd Hanafi, Muhammad Sidik

    Published 2020
    “…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Design of intelligent Qira’at identification algorithm by Kamarudin, Noraziahtulhidayu

    Published 2017
    “…The process of the SPAP Algorithm is to extend parameters of the Affine Projection Block with two different selections of windowing length that affect the final accuracy on pattern classification. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Sheet C1 Pattern Number Recognition Using Artificial Immune System Optimization by Yuniarti Denita, Sari, Tri Basuki, Kurniawan, Edi Surya, Negara, Tata, Sutabri

    Published 2022
    “…In order to recognize the numerical patterns on sheet C1, we, therefore, require a method that uses the Artificial Immune System (AIS), specifically the CSA (Clonal Selection Algorithm) algorithm, which is one of the AIS system's algorithms for optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Parameter estimation in double exponential smoothing using genetic algorithm / Foo Fong Yeng, Lau Gee Choon and Zuhaimy Ismail by Foo, Fong Yeng, Lau, Gee Choon, Ismail, Zuhaimy

    Published 2014
    “…The objective of this research is to estimate the Double Exponential Smoothing by using Genetic Algorithm Mechanism. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida by Nanyonga , Aziida

    Published 2019
    “…Prediction, identification, understanding and visualization of relationship between factors affecting mortality in ACS patients using feature selection and ML algorithms. Feature selection, classification and pattern recognition methods have been used in this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…Fourthly, adaptive search pattern selection takes into account various types of motion content by dynamically switching between stationary, center biased and, uniform search patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid by Mohd Zaid, Aishah Nabila

    Published 2024
    “…Literature review, knowledge acquisition, and dataset collection inform algorithm selection and dataset validation. The design and implementation phase focus on prototype development, while the evaluation phase assesses classification performance. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  20. 20