Search Results - (( java implementation modified algorithm ) OR ( using textual data algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An improved self organizing map using jaccard new measure for textual bugs data clustering by Ahmed, Attika

    Published 2018
    “…Considering the unsupervised learning algorithms, Self­Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  7. 7
  8. 8

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Thus, the proposed technique can increase retrieval performance and produce high accuracy textual data clusters. This model envisages a beneficial and useful approach for various domains that involve big textual data such as document clustering, topic detecting and tracking, information integration, personal data management and information retrieval.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  10. 10

    A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm by Nur Alya Afikah, Usop

    Published 2024
    “…Least significant bits (LSB) were used by the techniques to encrypt authentication data. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Rule-based filtering algorithm for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…Textual document is usually in unstructured form and high dimensional data.The exploration of hidden information from the unstructured text is useful to find interesting patterns and valuable knowledge.However, not all terms in the text are relevant and can lead to misclassification. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding by Sarwar, Talha, Mohd Noor, Noorhuzaimi Karimah, Miah, M. Saef Ullah

    Published 2022
    “…A textual data processing task that involves the automatic extraction of relevant and salient keyphrases from a document that expresses all the important concepts of the document is called keyphrase extraction. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An enhanced malay named entity recognition using clustering and classification approach for crime textual data analysis by Salleh, Muhammad Sharilazlan

    Published 2018
    “…Named Entity Recognition (NER) is one of the tasks undertaken in the information extraction. NER is used for extracting and classifying words or entities that belong to the proper noun category in text data such as the person's name, location, organization, date, etc. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Stegano-image as a digital signature to improve security authentication system in mobile computing by Mantoro, Teddy, Permadi, Didit Dwi, Abubakar, Adamu

    Published 2016
    “…One of the authentication techniques is a textual password based. This type of textual password commonly follows an encryption algorithm to provide security. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi by Che Alhadi, Nazirah

    Published 2012
    “…In order to develop this model classification and prototype, 480 Twitter’s messages were used as training data and 120 Twitter’s messages for testing data to determine the accuracy of the classification model. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan by Redzuan, Nur Amalina

    Published 2013
    “…While in Experiment III used 900 newspaper’s sentences as the training data and 100 newspaper’s sentences as the testing data and the accuracy is unproved to 65.81%. …”
    Get full text
    Get full text
    Thesis