Search Results - (( developing block learning algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…Each of the steps involved in the cryptanalysis is shown using animation technique developed using Macromedia Flash. This application is suitable for e-learning activities for students interested in the cryptanalysis of block cipher.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  11. 11

    Accident Prevention Block to Move an Automobile From Traffic Collision by Rajiv, Charles Samuel

    Published 2019
    “…This proposed solution is fueled by recent technological advancements like IoT (Internet of Things) and Machine Learning. In the present work, an attempt has been made to propose an accident prevention block in automobiles that can sense the tired/sleepy driver via a camera and algorithms, to maneuver the vehicle to safety. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Video Surveillance Image Enhancement Using Deep Learning by Aminudin, Muhamad Faris Che

    Published 2019
    “…To achieve the goal, Deep Learning Image Enhancement (DLIE) is proposed. There are two deep learning blocks which are Deep Learning Block 1 and Deep Learning Block2 (DLB1 and DLB2) and image fusion in the proposed DLIE model. …”
    Get full text
    Get full text
    Thesis
  15. 15

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. Firstly, the current intrusions preventions systems, biological innate and adaptive immune systems, autonomic computing and self-healing mechanisms are studied and analyzed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network by Francis, Adam

    Published 2005
    “…The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. And lastly, to develop an Artificial Neural Network for digit recognition. …”
    Get full text
    Student Project
  17. 17

    Spiking Neural Network For Energy Efficient Learning And Recognition by Wong, Yan Chiew, Wang, Ning Lo

    Published 2020
    “…This work presents essential properties of a spiking feedforward computing system that emulates the behaviour of biological neural networks, showing the potential for learning and classification in significantly reduced energy resources…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Blood cell classification using deep learning by Liaw, Mun Kin

    Published 2022
    “…The motivation was gotten from the literature review section where various researchers developed their own methods manually through experimenting such as ensemble methods, learning algorithms, combined methodologies, etc. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications. by S. Ahmed, Bestoun, Enoiu, Eduard, Afzal, Wasif, Kamal Z., Zamli

    Published 2020
    “…We applied Q-EMCQ on 37 real-world industrial programs written in Function Block Diagram (FBD) language, which is used for developing a train control management system at Bombardier Transportation Sweden AB. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…PCA is employed for learning multistage filter banks. Binary hashing and block histograms are the steps for indexing and pooling. …”
    Get full text
    Get full text
    Monograph