Search Results - (( java implementation modified algorithm ) OR ( using store study algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using store »
- store study »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Restock management system by using market basket analysis / Nazrin Adnan
Published 2016“…This study is focus on Market Basket Analysis which is analyze the customer purchase behavior from previous purchases by using apriori algorithm. …”
Get full text
Get full text
Thesis -
6
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
7
A Study Of Salting Method for Image Protection
Published 2013“…The general purpose of using this method is mainly because it provides the best type of security towards images, by implementing the method on the passwords used to gain access to the image stored in the database. …”
Other -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The study begins with a comprehensive background, examining the significance of classifying Google Play Store applications using user reviews. …”
Get full text
Get full text
Get full text
Article -
10
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…One of the technique to increase data capacity is by compressing the data and encode it with a suitable data encoder. This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
11
Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques
Published 2022“…This study aims to predict the ratings of Google Play Store apps using decision trees for classification in machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…The study used a retail store dataset consisting of 522,064 rows and 7 variables. …”
Get full text
Get full text
Article -
13
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
14
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
15
Increasing data storage of coloured QR code using CoMMT technique
Published 2020“…Quick Response (QR) Code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. …”
Get full text
Get full text
Article -
16
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item -
17
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
18
Prediction of payment method in convenience stores using machine learning
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement
Published 2013“…Genetic algorithm is used to search for the optimal mass distribution that carried out the farthest walking distance on various terrains. …”
Get full text
Get full text
Thesis -
20
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper
