Search Results - (( using optimization method algorithm ) OR ( data generating query algorithm ))

Refine Results
  1. 1

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The large amount of data generated and frequent changes in a short time make conventional processing methods insufficient. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Customer mobile behavioral segmentation and analysis in telecom using machine learning by Sharaf Addin, Eman Hussein, Admodisastro, Novia Indriaty, Mohd Ashri, Siti Nur Syahirah, Kamaruddin, Azrina, Chew, Yew Chong

    Published 2021
    “…Firstly, the customer’s dataset was generated using Faker Python package. Secondly was the pre-processing which includes the dimensionality reduction of the dataset using the PCA technique and finding the optimal number of clusters using the Elbow method. …”
    Get full text
    Get full text
    Article
  4. 4

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    The skyline operator algorithms: a review by Mohd Rum, Siti Nurulain, Mohd Ariffin, Noor Afiza, Asmawi, Aziah, Mohd Rum, Siti Fatimah, Dzolkhifli, Zarina

    Published 2019
    “…In the present decade, there is the revival of interest to find the best way to query the database that able to provide not only a single answer, but also a set of answers that can be the most preferred by users .In many cases, the overflow of data generated from social media, and many other data stored and shared over the Internet makes the data access becoming near –infinite to the users. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…Furthermore, the hash-join and Sort-Merge algorithms were used to generate the join query processing, and this was employed due to their capacity to allow for more data sets to be joined. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effective keyword query structuring using NER for XML retrieval by Roko, Abubakar, Doraisamy, Shyamala, Jantan, Azrul Hazri, Azman, Azreen

    Published 2015
    “…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
    Get full text
    Get full text
    Article
  9. 9

    Skyline queries on data with uncertain dimensions for efficient computation by Mohd Saad, Nurul Husna

    Published 2018
    “…Skyline query is crucial in multi-criteria decision making applications particularly in applications that generate uncertain data. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The experiments were conducted on self generated data sets (7 different sets) and well known datasets (Mushroom & Cars Data set). …”
    Get full text
    Get full text
    Thesis
  11. 11

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Dominance analyses reduction in skyline query processing over data stream with data mining technique by Ahmed Mohamud, Mudathir, Ibrahim, Hamidah, Sidi, Fatimah, Mohd Rum, Siti Nurulain

    Published 2025
    “…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    A flexible query transformation framework for structured retrieval / Gan Keng Hoon by Gan, Keng Hoon

    Published 2013
    “…Its main strength is to allow the transformation to be generic to cater for more than single type of structure query. Supporting this intermediate query representation are the query interpretation and query construction algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Keyword query processing interface model of ontological natural language manipulation by Hasany, Syed Muhammad Noman

    Published 2010
    “…The generated target queries are required to be ranked so that the results are reported in order to their relevance to the user query. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation of XML documents queries based on native XML database by Lazim, Raghad Yaseen

    Published 2016
    “…Most of the figures show that the XED starts better, but becomes worse as data size grows. The difference becomes obvious as the query becomes more complicated.…”
    Get full text
    Get full text
    Thesis
  18. 18

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
    Get full text
    Get full text
    Thesis
  19. 19

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases by Imam, A.A., Basri, S., Gonzalez-Aparicio, M.T., Balogun, A.O., Kumar, G.

    Published 2022
    “…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
    Get full text
    Get full text
    Conference or Workshop Item