Search Results - (( java implementation modified algorithm ) OR ( based computing machine algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…Computer Aided Process Planning (CAPP) is the bridge between computer-aided design (CAD) and computer-aided manufacturing (CAM). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…The support vector machine (SVM) is one of the most powerful machine learning algorithms with excellent learning performance characteristics. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process by Ali Al-Assadi, Hayder M. A.

    Published 2004
    “…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat by Selamat, Nur Syuhada

    Published 2021
    “…The benefit of this work indicated that the implementation of a feature selection technique plays an important role in machine learning algorithms to increase the performance of detection.…”
    Get full text
    Get full text
    Thesis
  20. 20