Search Results - (( filing adoption based algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- java application »
- filing adoption »
- adoption based »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Confidentiality based file attributes and data classification using TsF-KNN
Published 2015“…The main objective of this study is to predict the confidential and non-confidential data of a file using K-NN algorithm. We also proposed a method called Training dataset Filtration Key Nearest Neighbour (TsF-KNN) classifier which classifies the data of file based on the confidentiality level of the schema of a file (file attributes). …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Optimizing lossless compression by normalized data length in Huffman Algorithm
Published 2022“…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
Get full text
Get full text
Get full text
Thesis -
7
Test Cases Minimization Strategy Based On Flower Pollination Algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
12
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…A simplified consensus algorithm is then proposed in the thesis. It offers an identity-based encryption to create a key pair for each device. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Impatient job scheduling under cloud computing
Published 2012“…The proposed algorithm was transplanted in an adopted scheduling algorithm and tested using simu-lation with a synthetic dataset. …”
Get full text
Get full text
Thesis -
16
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
17
Face recognition using Eigenface/PCA / Muhammad Fadzli Ahmad Jalalulmahalli
Published 2005“…As for this thesis, the title is face recognition, which deal with the recognition of faces using computational methods. The algorithm that was adopted for this particular projects is the eigenfance algorithm, which reprocesses a set of face images into eigenvectors, or of ghostly faces, that shall be used as the base for the recognition process. …”
Get full text
Get full text
Thesis -
18
-
19
Dynamic replica replacement strategy in data grid
Published 2012“…In this paper, we present a dynamic replica replacement strategy, named Least Value Replacement (LVR), which can ascertain the importance of valuable replicas in a grid site. The LVR algorithms can automatically decide on which replica to be replaced whenever the storage element of the grid site is full based on information such as access frequency and files future value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article
