Search Results - (( knowledge identification problems algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- knowledge identification »
- identification problems »
- implementation modified »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Effective predicate identification algorithm for XML retrieval
Published 2018Get full text
Get full text
Conference or Workshop Item -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Topic identification method for textual document
Published 2017“…Abstract— Topic identification is a crucial task for discovering knowledge from textual document. …”
Get full text
Get full text
Get full text
Article -
7
Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg
Published 2006“…Thus, in order to provide better access to relevant knowledge, the knowledge of metabolic pathway should be conceptualized and formalized using appropriate knowledge representation technique. …”
Get full text
Get full text
Thesis -
8
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Plants identification has become a significant and incentive research area. …”
Get full text
Get full text
Thesis -
9
-
10
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
15
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
Get full text
Get full text
Get full text
Article -
16
Vision based entomology: a survey
Published 2014“…There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. …”
Get full text
Get full text
Get full text
Article -
17
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Furthermore, it employs Predicates Identification Algorithm (PIA) and Entity Identification Algorithm (EIA) to identify user search intention. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Advances in automatic insect classification
Published 2014“…There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. …”
Get full text
Get full text
Get full text
Article -
20
