Search Results - (( java implementation modified algorithm ) OR ( using data window algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- window algorithm »
- data window »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Date store management in sliding window based on-line identification algorithms
Published 2001“…Sliding window identification algorithms use information from a store of data to optimise on-line learning. …”
Get full text
Get full text
Conference or Workshop Item -
4
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
SLIDING WINDOW TRAINING ALGORITHMS USING MLP-NETWORK FOR CORRELATED AND LOST PACKET DATA
Published 2012“…The SW learning is investigated with different resetting criterion, diierent step size choices and different window sizes in addition to improving the existing SW module by proposing different data store management @SM) techniques that is used to reduce correlation inside the window store. …”
Get full text
Get full text
Thesis -
7
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
Published 2016“…Crucial to this is the width of the sliding window. This study utilized raw data from network traffic and built a Neural Network (NN) model trained with the Cuckoo Search (CS) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
10
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…EWR is a fully online clustering technique for handling high-dimensional data streams using feature ranking and sorting. This process is accomplished by calculating the entropy of specific features with respect to the time window. …”
Article -
11
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…Current research on tackling uncertainty revolves around creating specifically tailored algorithms that can operate in the presence of value uncertainty using both a count-based and a time-based approach. …”
Get full text
Get full text
Get full text
Thesis -
12
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The algorithm output can use any length of data input. …”
Get full text
Get full text
Get full text
Article -
13
Application of a simple mono window land surface temperature algorithm from landsat ETM+ over al Qassim, Saudi Arabia
Published 2012“…This study was conducted to retrieve the land surface temperature (LST) from Landsat ETM+ data for Al Qassim, Saudi Arabia. The proposed technique employed a mono window LST algorithm for retrieving surface temperature from Landsat ETM+. …”
Get full text
Get full text
Get full text
Article -
14
An enhancement of sliding window algorithm for rainfall forecasting
Published 2017“…The validation analysis shows that the proposed method has a higher forecasting accuracy than the previous method of sliding window algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Sensing texture using an artificial finger and a data analysis based on the standard deviation
Published 2015“…The SD analysis for texture detection is novel as it uses a combination of arithmetic processes. It windows the data sequentially and calculates the SD of the data in the windows and then averages the SDs. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…In this paper, the adapted streaming data Isolation Forest (iForestASD) algorithm has been applied to CAN intrusion detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
CC_TRS: continuous clustering of trajectory stream data based on micro cluster life
Published 2017“…The evaluation of the proposed algorithm on real data sets shows the efficiency and the effectiveness of the proposed algorithm and proved it is efficient alternative to time window technique.…”
Get full text
Get full text
Get full text
Article -
18
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
Get full text
Get full text
Student Project -
19
Improving collection of data type evidence and the integrity of evidence collected using SHA-256 hashing algorithm for web browsers
Published 2024“…The use of the SHA-256 hash algorithm currently considered secure and resistant to collision attacks. …”
Get full text
Get full text
Get full text
Article -
20
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis
