Search Results - (( based learning normalization algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- normalization algorithm »
- implementation modified »
- learning normalization »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
7
Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak
Published 2020“…Towards achieving better detection in real-time environment, colour pixel-based images were trained on five pre-trained CNNs using transfer learning algorithm. …”
Get full text
Get full text
Thesis -
8
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…Finally, surface defects are segmented from an anomaly heat map which is generated based on histogram distance functions. Results show that the proposed algorithm required a learning dataset size as small as 5 samples and was resistant to learning labelling error up to 50%.…”
Get full text
Get full text
Thesis -
9
One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network
Published 2012“…By using 'seen' and 'unseen' of electrical energy demand data were used to test the performance of the proposed algorithm. Based on result obtained, it shows that IWO learning algorithm is capable to produce accurate prediction load demand. …”
Get full text
Get full text
Student Project -
10
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
11
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
12
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
13
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
14
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Based on its simplicity, the K-means algorithm has been used in many fields. …”
Get full text
Get full text
Get full text
Article -
15
Weather prediction in Kota Kinabalu using linear regressions with multiple variables
Published 2021“…Numerical weather prediction is the process of using existing numerical data on weather conditions to forecast the weather using machine learning algorithms. This study employs machine learning algorithms, a linear regression model using statistics, and two optimization approaches, the normal equation approach, and gradient descent approach to predict the weather based on a few variables. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…As the result, the Random Forest algorithm is the best algorithm which is measured based on measurement metric i.e. …”
Get full text
Get full text
Get full text
Thesis -
17
A modified Q-learning path planning approach using distortion concept and optimization in dynamic environment for autonomous mobile robot
Published 2023“…The normal mode operates according to the standard Q-learning procedures. …”
Get full text
Get full text
Get full text
Article -
18
A modified Q-learning path planning approach using distortion concept and optimization in dynamic environment for autonomous mobile robot
Published 2023“…The normal mode operates according to the standard Q-learning procedures. …”
Get full text
Get full text
Get full text
Article -
19
Voltage stability index prediction by using genetics algorithm-based machine learning (GBML) technique / Zainab Mohd Ghazali
Published 2007“…The proposed technique is using Genetic Algorithms-Based Machine Learning (GBML) to predict the voltage stability index. …”
Get full text
Get full text
Thesis -
20
Pengkelasan Sel Kanser Pangkal Rahim Kepada Sel Normal Dan Tidak Normal Menggunakan Analisis Pembezalayan Dan Rangkaian Neural
Published 2006“…The optimum value of epoch and hidden nodes for each learning algorithm are determined based on the highest accuracy obtained during training phases. …”
Get full text
Get full text
Monograph
