Search Results - (( write classification system algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- classification system »
- write classification »
- java implementation »
- system algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In this research study, I proposed an automated system for detecting the similarity of an article with well-written academic writing by noticing various term forms. …”
Get full text
Get full text
Get full text
Thesis -
4
Feature selection based on particle swarm optimization algorithm for sentiment analysis classification
Published 2021“…The current conditions of the data sources are very different, and it offers a variety of writing systems. Therefore, the results of accuracy in sentiment analysis are very important. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
10
CHINESE CHARACTER RECOGNITION USING SUPPORT VECTOR MACHINE
Published 2023“…Chinese characters are one of the world's most widely used writing systems. It is used by more than one-quarter of the world�s population in daily communication. …”
Article -
11
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011Get full text
Get full text
Conference or Workshop Item -
12
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011Get full text
Get full text
Conference or Workshop Item -
13
-
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…CNN was chosen as an algorithm for classification task because various studies had concluded that it is able to produce highly accurate result. …”
Get full text
Get full text
Thesis -
16
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
17
From Jurisprudence to Algorithms: The Role of Artificial Intelligence in Contemporary Sharia Financial Decision-Making
Published 2025journal::journal article -
18
Ensemble learning using multi-objective optimisation for arabic handwritten words
Published 2021“…It is a widespread and computationally costly function due to cursive writing, a massive number of words, and writing style. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
