Search Results - (( semantics implementation some algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- semantics implementation »
- implementation modified »
- implementation some »
- java implementation »
- some algorithm »
-
1
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…This project will be using Latent Semantic Analysis Algorithm to cope with comparisons of khutbah texts as it’s cover most of the requirement of the system. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING
Published 2010“…A variant of distance measurement, cosine similarity, is also embedded to this algorithm. The results are then compared with some existing algorithms, which are used for benchmark purposes. …”
Get full text
Get full text
Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Assisting novice researchers in utilizing the web as a platform for research: Semantic approach
Published 2023“…Thus, the purpose of this paper is to explore each of these support features and suggest state-of-the art development approach by utilizing Semantic Web technologies. The algorithms involved with each of the support features will be discussed. …”
Article -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Assisting novice researchers in utilizing the web as a platform for research: semantic approach
Published 2009“…Thus, the purpose of this paper is to explore each of these support features and suggest state-of-the art development approach by utilizing Semantic Web technologies. The algorithms involved with each of the support features will be discussed. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Object-to-Multidimensional database mapping algorithms
Published 2003“…Finally, some performance issues are presented and future possible researches are outlined.…”
Get full text
Get full text
Article -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…For the generality of target query representation and to incorporate quantifiers, subclasses and sub-class unions, we define an extended representation of the conjunctive query, termed as extended conjunctive query. But for the implementation of user query AND-OR semantics and semantic ranking, we define an efficient representation, termed as compact Boolean query (CBQ). …”
Get full text
Get full text
Thesis -
14
ProCAss: An intelligent assessment for computer programming corpus
Published 2005“…Electronic assessment (e-assessment) becomes more popular in educational tools especially in e-learning environment.This is because it has some advantages such as reducing the staffs needed for assessment tasks, automated marking is not prone to human error and it gives instant feedback to the students.However, the e-assessment existed only more on assessing essays and lack of implementation in assessing computer program in computer science environment [Haley, et.al, 2003]. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Stylometric authorship balanced attribution prediction method
Published 2011“…In this research, we propose a new Stylometric method known as the Stylometric authorship balanced attribution (SABA) that is able to overcome these problems with higher accuracy prediction and independent from human judgments, which means that the method does not rely on the domain experts. The new method is implemented by merging three methods, which are called the computational approach, the Winnow algorithm and the Burrows-delta method. …”
Get full text
Get full text
Thesis -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
18
Query disambiguation approach using triple-filter
Published 2017Get full text
Get full text
Get full text
Thesis -
19
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
20
Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali
Published 2013“…However, being goal-driven (query driven) PROLOG’S query engine suffers from some well-known problems such as susceptibility to infinite looping, repeated subcomputation and unsatisfactory semantics of negation. …”
Get full text
Get full text
Get full text
Thesis
