Search Results - (( java implementation modified algorithm ) OR ( using data (processing OR proceeding) algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Pattern Discovery Using K-Means Algorithm by Ahmed, AM, Norwawi, NM, Ishak, WHW, Alkilany, A

    Published 2024
    “…This paper will discuss the results of a pattern extraction process using a clustering algorithm that is k-means. …”
    Proceedings Paper
  7. 7

    HYBRID: an efficient unifying process to mine frequent itemsets by Zulkurnain, Nurul Fariza, Shah, Ahmad

    Published 2018
    “…In this paper, an efficient hybrid algorithm was designed using a unifying process of the algorithms Improved Apriori and FP-Growth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Immune network algorithm in monthly streamflow prediction at Johor river by Mat Ali, Nur Izzah, Abdul Malik, Marlinda, Ismail , Amelia Ritahani

    Published 2014
    “…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…As the immense growth of data have affected many organizations, there have been a need to adopt the cloud resources for processing big data applications which could cost highly by using traditional storage. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The results showed that using canopy as a preprocessing step cut the time it proceeds to deal with the significant number of power load abnormalities found in parallel using a fast density peak dataset and the time it proceeds for the k-means algorithm to run. …”
    Article
  12. 12

    Computational Discovery of Motifs Using Hierarchical Clustering Techniques by Wang, Dianhui, Lee, Nung Kion

    Published 2008
    “…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13
  14. 14

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…The performance metric used to measure the performance are time duration for a complete process and CPU utilization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Sizes of Superpixels and their Effect on Interactive Segmentation by Goh, Kok Luong, Ng, Giap Weng, Muzaffar, Hamzah, Chai, Soo See

    Published 2021
    “…Pre-processing steps can be used to speed up the segmentation process while improving the end result. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  16. 16

    Algorithmic approaches in model selection of the air passengers flows data by Ismail, Suzilah, Yusof, Norhayati, Tuan Muda, Tuan Zalizam

    Published 2015
    “…Algorithm is an important element in any problem solving situation.In statistical modelling strategy, the algorithm provides a step by step process in model building, model testing, choosing the ‘best’ model and even forecasting using the chosen model.Tacit knowledge has contributed to the existence of a huge variability in manual modelling process especially between expert and non-expert modellers.Many algorithms (automated model selection) have been developed to bridge the gap either through single or multiple equation modelling.This study aims to evaluate the forecasting performances of several selected algorithms on air passengers flow data based on Root Mean Square Error (RMSE) and Geometric Root Mean Square Error (GRMSE).The findings show that multiple models selection performed well in one and two step-ahead forecast but was outperformed by single model in three step-ahead forecasts.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Sizes of Superpixels and their Effect on Interactive Segmentation by Kok, Luong Goh, Giap, Weng Ng, Muzaffar Hamzah, Soo, See Chai

    Published 2021
    “…Pre-processing steps can be used to speed up the segmentation process while improving the end result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  19. 19

    Driver drowsiness detection using different classification algorithms by Nor Shahrudin, Nur Shahirah, Sidek, Khairul Azami

    Published 2020
    “…Hence, this paper present and prove the reliability of ECG signal for drowsiness detection in classifying high accuracy ECG data using different classification algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Exploring imbalanced class issue in handwritten dataset using convolutional neural networks and deep belief networks by Amri, A’inur A’fifah, Ismail, Amelia Ritahani, Abdullah, Ahmad Zarir

    Published 2016
    “…However, deep learning algorithms such as convolutional neural networks and deep belief networks showed promising results in many domains, especially in image processing. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper