Search Results - (( data validating _ algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Automated Validation of Crowdsourced Data
Published 2023“…Algorithms; Automation; Reliability; automated; crowdsourcer; Data validation; valid data; validity; Crowdsourcing…”
Conference Paper -
6
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
7
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…An NIRR simulator is deployed and is validated by ensuring the output data closely resemble the output data published by (Abdulrahim et al., 2014). …”
Get full text
Get full text
Thesis -
8
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
10
Cluster validity of the fuzzy C-means algorithm in mammographic image using adaptive cluster & partition entropy indexes / Azwani Aziz
Published 2010“…This problem can be solved by cluster validity index. Cluster validity index is needed to find the suitable number of cluster, c in any fuzzy clustering algorithm. …”
Get full text
Get full text
Thesis -
11
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…An NIRR simulator is deployed and is validated by ensuring the output data closely resemble the output data published by [1]. …”
Get full text
Get full text
Get full text
Article -
12
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
13
Text Extraction Algorithm for Web Text Classification
Published 2010“…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
Get full text
Get full text
Get full text
Thesis -
14
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
15
A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation
Published 2023“…Grid search cross validation (CV) is applied for hyperparameter tuning of the algorithms. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Optimization of Multilayer Perceptron (MLP) network training algorithms for agrwood oil quality separation / Noratikah Zawani Mahabob ... [et al.]
Published 2020“…The data is divided into three groups with a ratio of 70%: 15%: 15% for training, validation, and testing respectively. …”
Get full text
Get full text
Conference or Workshop Item -
18
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
Get full text
Get full text
Get full text
Article -
19
Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan
Published 2024“…Text preprocessing ensures consistent data representation and facilitates validation. The Machine Learning algorithm, comprising Random Forest, Linear Regression, XGBoost, SVM, and Stacking Ensemble, is embedded in the system for job position predictions based on the analysed data. …”
Get full text
Get full text
Thesis -
20
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis
