Search Results - (( java implementation modified algorithm ) OR ( using string machine algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimization of job scheduling in a machine shop using genetic algorithm by Adhikari, A., Biswas, C.K., Adhikari, N.

    Published 2002
    “…As job scheduling involves allocation of jobs to machines to reduce the idle time of machines, the aim of this work emphasises on minimizing the cycle time by using genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  3. 3

    Optimization of job scheduling in a machine shop using genetic algorithm by Adhikari, A., Biswas, C.K., Adhikari, N.

    Published 2002
    “…As job scheduling involves allocation of jobs to machines to reduce the idle time of machines, the aim of this work emphasises on minimizing the cycle time by using genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi

    Published 2023
    “…In order to select the most significant wavelengths, genetic algorithm (GA) was used as a forward feature selection technique. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In feature extraction, the Lexicon-based Model, Machine learning Model and deep learning Model usually was used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  15. 15

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
    Get full text
    Thesis
  16. 16
  17. 17

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Firdaus, Ahmad, Anuar, Nor Badrul, Karim, Ahmad, Razak, Mohd Faizal Ab

    Published 2018
    “…However, static analysis requires a minimum number of features to efficiently classify malware. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
    Get full text
    Get full text
    Article
  19. 19

    Discovering optimal features using static analysis and a genetic search based method for Android malware detection by Ahmad Firdaus, Zainal Abidin, Nor Badrul, Anuar, Ahmad, Karim, Mohd Faizal, Ab Razak

    Published 2018
    “…However, static analysis requires a minimal number of features to classify malware efficiently. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Random sampling method of large-scale graph data classification by Rashed Mustafa, Mohammad Sultan Mahmud, Mahir Shadid

    Published 2024
    “…Finally, we classified the graphs of data blocks using the SVM algorithm. In experimental evaluation, our proposed method outperformed state-of-the-art graph kernels on graph classification datasets in terms of accuracy.…”
    Get full text
    Get full text
    Get full text
    Article