Search Results - (( java implementation max algorithm ) OR ( using string learning algorithm ))
Search alternatives:
- java implementation »
- implementation max »
- learning algorithm »
- string learning »
- max algorithm »
- using string »
-
1
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
2
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…Many algorithms have been implemented to solve the grid scheduling problem. …”
Get full text
Get full text
Get full text
Thesis -
3
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Baldwinian learning uses learning algorithm to change the fitness landscape, but the solution that is found is not encoded back into genetic string. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Development of unconstrained handwritten digit extraction, segmentation and recognition on bank cheques using artificial neural network
Published 2005“…The second objective is to locate the position of the amount courtesy block for the extraction process by using the Coordinate Search. The third objective is to perform Vertical Splitting Algorithm technique for digit segmentation. …”
Get full text
Student Project -
8
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
Published 2024“…To conduct this experiment, we employed the CloudSim simulator, which is implemented using the Java programming language.…”
Get full text
Get full text
Get full text
Get full text
Article -
9
Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics
Published 2023“…In order to select the most significant wavelengths, genetic algorithm (GA) was used as a forward feature selection technique. …”
Get full text
Get full text
Article -
10
A review on sentiment analysis model Chinese Weibo text
Published 2020“…In feature extraction, the Lexicon-based Model, Machine learning Model and deep learning Model usually was used. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
11
Personal identification by Keystroke Pattern for login security
Published 2001“…The data obtained were presented to NN for pattern learning and classifying the strings of characters. …”
Get full text
Get full text
Thesis -
12
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
13
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
Get full text
Thesis -
14
Ensemble based categorization and adaptive model for malware detection
Published 2011“…Current malware detection method involved string search algorithm which based on the pattern detection. …”
Get full text
Get full text
Get full text
Article -
15
-
16
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…The content negotiation and adaptation architecture was implemented and validated through various laboratory experiments and field studies which the results highlight the importance of using token attributes matcher by eliminating the need of using the entire user agent strings for device identification and capabilities detection. …”
Get full text
Get full text
Thesis -
17
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…However, static analysis requires a minimum number of features to efficiently classify malware. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
Get full text
Get full text
Article -
18
Discovering optimal features using static analysis and a genetic search based method for Android malware detection
Published 2018“…However, static analysis requires a minimal number of features to classify malware efficiently. Therefore, we used genetic search (GS), which is a search based on a genetic algorithm (GA), to select the features among 106 strings. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
How can unmanned aerial vehicles be used for detecting weeds in agricultural fields?
Published 2021“…Most of the weed images were captured using red, green, and blue (RGB) camera, i.e., 48.28% and main classification algorithm was machine learning techniques, i.e., 47.90%. …”
Get full text
Get full text
Get full text
Article -
20
How Can Unmanned Aerial Vehicles Be Used for Detecting Weeds in Agricultural Fields?
Published 2024Article
