Search Results - (( java implementation modified algorithm ) OR ( using textual data algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- data algorithm »
- using textual »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Construction and optimization of financial risk management model based on financial data and text data influencing information system
Published 2024“…Westudy how textual data aids financial risk management algorithms' risk prediction. …”
Get full text
Get full text
Get full text
Article -
3
Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm
Published 2020“…We believe that the result could be better by improving the data, algorithms, algorithm tuning or ensemble methods for the future experiments…”
Get full text
Get full text
Get full text
Get full text
Article -
4
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, SelfOrganizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
7
A survey on textual semantic classification algorithms
Published 2018Get full text
Get full text
Article -
8
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Thus, the proposed technique can increase retrieval performance and produce high accuracy textual data clusters. This model envisages a beneficial and useful approach for various domains that involve big textual data such as document clustering, topic detecting and tracking, information integration, personal data management and information retrieval.…”
Get full text
Get full text
Thesis -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
10
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Least significant bits (LSB) were used by the techniques to encrypt authentication data. …”
Get full text
Get full text
Thesis -
11
Rule-based filtering algorithm for textual document
Published 2017“…Textual document is usually in unstructured form and high dimensional data.The exploration of hidden information from the unstructured text is useful to find interesting patterns and valuable knowledge.However, not all terms in the text are relevant and can lead to misclassification. …”
Get full text
Get full text
Get full text
Article -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
13
Document classification based on kNN algorithm by term vector space reduction
Published 2023Conference Paper -
14
Evaluating keyphrase extraction algorithms for finding similar news articles using lexical similarity calculation and semantic relatedness measurement by word embedding
Published 2022“…A textual data processing task that involves the automatic extraction of relevant and salient keyphrases from a document that expresses all the important concepts of the document is called keyphrase extraction. …”
Get full text
Get full text
Get full text
Article -
15
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…Most of the available encryption algorithms are mainly used for textual data and may not be suitable for multimedia data such as images. …”
Get full text
Get full text
Get full text
Article -
16
An enhanced malay named entity recognition using clustering and classification approach for crime textual data analysis
Published 2018“…Named Entity Recognition (NER) is one of the tasks undertaken in the information extraction. NER is used for extracting and classifying words or entities that belong to the proper noun category in text data such as the person's name, location, organization, date, etc. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
Stegano-image as a digital signature to improve security authentication system in mobile computing
Published 2016“…One of the authentication techniques is a textual password based. This type of textual password commonly follows an encryption algorithm to provide security. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi
Published 2012“…In order to develop this model classification and prototype, 480 Twitter’s messages were used as training data and 120 Twitter’s messages for testing data to determine the accuracy of the classification model. …”
Get full text
Get full text
Thesis -
20
Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan
Published 2013“…While in Experiment III used 900 newspaper’s sentences as the training data and 100 newspaper’s sentences as the testing data and the accuracy is unproved to 65.81%. …”
Get full text
Get full text
Thesis
