Search Results - (( java implementation modified algorithm ) OR ( using data window algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Date store management in sliding window based on-line identification algorithms by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2001
    “…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  6. 6

    SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA by AHMED IZZELDIN, HUZAIFA TAWFEIG

    Published 2012
    “…The SW learning is investigated with different resetting criterion, diierent step size choices and different window sizes in addition to improving the existing SW module by proposing different data store management @SM) techniques that is used to reduce correlation inside the window store. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm by Abubakar, Adamu, Chiroma, Haruna, Khan, Abdullah, Mohamed, Elbaraa Eldaw Elnour

    Published 2016
    “…Crucial to this is the width of the sliding window. This study utilized raw data from network traffic and built a Neural Network (NN) model trained with the Cuckoo Search (CS) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…EWR is a fully online clustering technique for handling high-dimensional data streams using feature ranking and sorting. This process is accomplished by calculating the entropy of specific features with respect to the time window. …”
    Article
  11. 11

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…Current research on tackling uncertainty revolves around creating specifically tailored algorithms that can operate in the presence of value uncertainty using both a count-based and a time-based approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Application of a simple mono window land surface temperature algorithm from landsat ETM+ over al Qassim, Saudi Arabia by Lim, H.S, Mat Jafri, M·Z, Abdullah, K, Sultan AlSultan

    Published 2012
    “…This study was conducted to retrieve the land surface temperature (LST) from Landsat ETM+ data for Al Qassim, Saudi Arabia. The proposed technique employed a mono window LST algorithm for retrieving surface temperature from Landsat ETM+. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An enhancement of sliding window algorithm for rainfall forecasting by Azahar, Siti Nor Fathihah, Othman, Mahmod, Saian, Rizauddin

    Published 2017
    “…The validation analysis shows that the proposed method has a higher forecasting accuracy than the previous method of sliding window algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Sensing texture using an artificial finger and a data analysis based on the standard deviation by Chappell, Paul H., Muridan, Norasmahan, Mohamad Hanif, Nik Hazrin, Cranny, Andy, White, Neil M.

    Published 2015
    “…The SD analysis for texture detection is novel as it uses a combination of arithmetic processes. It windows the data sequentially and calculates the SD of the data in the windows and then averages the SDs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Using streaming data algorithm for intrusion detection on the vehicular controller area network by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2022
    “…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    CC_TRS: continuous clustering of trajectory stream data based on micro cluster life by Abdulrazzaq, Musaab Riyadh, Mustapha, Norwati, Sulaiman, Md. Nasir, Mohd Sharef, Nurfadhlina

    Published 2017
    “…The evaluation of the proposed algorithm on real data sets shows the efficiency and the effectiveness of the proposed algorithm and proved it is efficient alternative to time window technique.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis