Search Results - (( developing table learning algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- developing table »
- table learning »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Development of a diversified ensemble data summarization (DDS) tool for learning medical data in a multi relational environment
Published 2012“…A diversified data summarization ensemble method is best applied in the task of learning data stored in multiple tables since ensemble methods improve quality and robustness of the results. …”
Get full text
Get full text
Research Report -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
4
Development of a syncope classification algorithm from physiological signals acquired in tilt-table test
Published 2023“…Syncope also known as transient loss of consciousness which caused problem to human daily life. Since machine learning is much more advanced, classification of syncope can be done with machine learning. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
7
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…A novel investigation in modelling of groundwater level and quality using Artificial Neural Networks (ANNs) and Adaptive neuro fuzzy inference systems (ANFIS) methods was developed in the study area. Water table modelling based on ANNs and ANFIS technology were developed to simulate the water table fluctuations based on the relationship between the variations of rainfall, humidity, evaporation, minimum and maximum temperature and water table depth. …”
Get full text
Get full text
Thesis -
8
Deep reinforcement learning to multi-agent deep reinforcement learning
Published 2022“…In the third section, we look at the RL and important algorithms that exist in this area. In the fourth section, we study DRL and explain the reasons for which different algorithms have been developed in this regard. …”
Get full text
Get full text
Article -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Evaluation of arima and ann stream analytics for air quality monitoring system
Published 2021“…The data stored in the query table act as input to the analytics algorithm, which runs in R-server as well. …”
Get full text
Get full text
Thesis -
11
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Prediction of oil and gas pipeline failures through machine learning approaches: A systematic review
Published 2023“…The rapid progress of machine learning (ML) technologies provides an advantageous opportunity to develop predictive models that can effectively tackle these challenges. …”
Get full text
Get full text
Article -
13
-
14
Diamond price prediction using random forest algorithm / Nur Amirah Mohd Azmi
Published 2025“…This project addresses the challenge of accurately pricing diamonds by leveraging machine learning techniques. Diamonds are priced based on various attributes such as carat, cut, color, clarity, depth, and table, which exhibit complex interrelationships. …”
Get full text
Get full text
Thesis -
15
Windows-Based bandwidth allocation on optical networks
Published 2009Get full text
Get full text
Conference or Workshop Item -
16
Customer behavior analysis based on purchasing history and reviews using automated decision-making systems
Published 2025“…Machine Learning Techniques for Customer Behavior Analysis: Customer satisfaction can be identified for online purchasing using the machine learning method. …”
Get full text
Get full text
Article -
17
Optimisation and control of fed-batch yeast production using q-learning
Published 2013“…QLE signifies the importance of exploration from time to time based on the developed “past experience” in Q-table to optimise the process. …”
Get full text
Get full text
Get full text
Thesis -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
19
Machine Learning-Enabled Communication Approach for the Internet of Medical Things
Published 2023“…Furthermore, the machine learning approach helps enable these devices to update their routing tables simultaneously, and an optimal path could be replaced if a better one is available. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
Get full text
Get full text
Thesis
