Search Results - (( development continuous learning algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao by He , Biao

    Published 2024
    “…The developed model is expected to possess the ability of continual learning, which is particularly advantageous in dynamic environments like tunnel blasting. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…The research investigates malware and machine learning in the context of cybersecurity, including malware detection taxonomy and machine learning algorithm classification into numerous categories. …”
    Article
  7. 7

    Development of algorithm for improved maze navigation by Ahmad, Faiz Aydil

    Published 2014
    “…This paper describes the development of algorithm for improved maze navigation and it is a continuation on a previous project. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Learning style analysis based on Felder-Silverman Index Model using Rule Base algorithm by Nurhakim, Muhammad, Ismail, Suhaila, Mohd Yusop, Nurhafizah Moziyana, Ahmad, Siti Rohaidah

    Published 2024
    “…To overcome this concern, the Learning Style Analysis System (SAGP) was developed to identify and provide recommendations based on individual learning styles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…It discusses recent machine learning and deep learning work with various network implementations, applications, algorithms, learning approaches, and datasets to develop an operational intrusion detection system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…In the cycle of Industrial Revolution 4.0 (IR 4.0), many issues in the industries can be solved with implementation of artificial intelligence approaches, including machine learning models. Designing an effective machine learning model for prediction and classification problems is a continuous effort. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    PREDICTING THE PRICE OF COTTON USING RNN AND LSTM by MOHAMAD, AHMAD LUKMAN

    Published 2020
    “…The accuracy of each machine learning algorithm will be recorded and analyze to come up with the best model for the dataset. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A New Quadratic Binary Harris Hawk Optimization For Feature Selection by Abdullah, Abdul Rahim, Too, Jing Wei, Mohd Saad, Norhashimah

    Published 2019
    “…However, the original HHO is developed to solve the continuous optimization problems, but not to the problems with binary variables. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with the advent of deep learning algorithms and artificial neural networks that can generate features automatically without human intervention, researchers began to rely on deep learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review by Musri, Nabila, Christie, Brenda, Ichwan, Solachuddin Jauhari Arief, Cahyanto, Arief

    Published 2021
    “…Identifying caries with a deep convolutional neural network-based detector enables the operator to distinguish changes in the location and morphological features of dental caries lesions. Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    SYSTEMATIC DESIGN OF SIMPLY STRUCTURED COMPENSATOR by FUNG , CHUN TING

    Published 2005
    “…In this project, the algorithm of the tuning method based on Nyquist Stability Criterion is developed first. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Real time long range (LoRa) based indoor positioning system using Deep Gaussian Process (DGP) algorithm / Ng Tarng Jian by Ng, Tarng Jian

    Published 2025
    “…These findings highlight the potential of combining LoRa technology with advanced machine learning algorithms and filtering techniques to achieve precise and reliable indoor tracking. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20