Search Results - (( java implementation modified algorithm ) OR ( quality function tree algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Tree physiology optimization in constrained optimization problem by Halim, A.H., Ismail, I.

    Published 2018
    “…This paper introduces Tree Physiology Optimization (TPO) algorithm for solving constrained optimization problem and compares the performance with other existing metaheuristic algorithms. …”
    Get full text
    Get full text
    Article
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…Therefore, in this research project, the process will be conducted by using an image classifier with the model of a machine learning algorithm which the candidates comprise of Support Vector Machine, k-Nearest Neighbour and Decision Tree. k-nearest neighbour has the highest F1-score (0.51) than the other two algorithms (Support Vector Machine: 0.50, and Decision Tree: 0.48). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques by Kayalvily, Tabianan, Denis, Arputharaj, Mohd Norshahriel, Abd Rani, Sarasvathi, Nahalingham

    Published 2022
    “…This study aims to predict the ratings of Google Play Store apps using decision trees for classification in machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Recently, different models were used to generate knowledge from vague and uncertain data sets such as induction decision tree, neural network, fuzzy logic, genetic algorithm, rough set theory, and others. …”
    Get full text
    Get full text
    Thesis
  11. 11

    IMPACT OF NUMBER OF ATTRIBUTES ON THE ACCURACY OF HUMAN MOTION CLASSIFICATION by Chan, Choon K, Girma, T. Chala*

    Published 2018
    “…The impact of the number of attributes on classification accuracy is evaluated via Bayes, Function, Lazy, Meta, Rule and Trees classifier algorithms supported by the WEKA tool. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…The aim of Stereo Vision Disparity Map (SVDM) algorithm is to obtain the disparity map from two images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of an Activity Recognition System Using Accelerometers by Hui, Dandy Lau Jing

    Published 2014
    “…An analytical software was developed using MATLAB to further illustrate the functions of the system. With accelerometers that capture the acceleration rate of different activities and Decision Tree algorithm for classification, the system is able to predict accurately the activity performed by the wearer. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis
  20. 20

    SRPTackle: a semi-automated requirements prioritisation technique for scalable requirements of software system projects by Fadhl, Hujainah, Rohani, Abu Bakar, Nasser, Abdullah B., Al-haimi, Basheer, Kamal Z., Zamli

    Published 2021
    “…Method: SRPTackle provides a semiautomated process based on a combination of a constructed requirement priority value formulation function using a multi-criteria decision-making method (i.e. weighted sum model), clustering algorithms (K-means and K-means++) and a binary search tree to minimise the need for expert involvement and increase efficiency. …”
    Get full text
    Get full text
    Get full text
    Article