Search Results - (( java implementation modified algorithm ) OR ( basic learning normalization algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Based on its simplicity, the K-means algorithm has been used in many fields. This paper proposes improved normalization and standardization techniques for higher purity in K-means clustering experimented with benchmark datasets from UCI machine learning repository and it was found that all the proposed techniques’ performance was much higher compared to the conventional K-means and the three classic transformations, and it is evidently shown by purity and Rand index accuracy results.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Surface Normals with Modular Approach and Weighted Voting Scheme in 3D Facial Expression Classification by Hamimah, Ujir, Spann, Michael

    Published 2014
    “…In this work, we are interested by the employment of 3D facial surface normals (3DFSN) to classify six basic facial expressions and the proposed approach was employed on the Bosphorus database. …”
    Get full text
    Get full text
    Article
  9. 9

    Neural network paradigm for classification of defects on PCB by Heriansyah, Rudi, Syed Al-Attas, Syed Abdul Rahman, Zabidi, Muhammad Mun'im Ahmad

    Published 2003
    “…A new technique is proposed to classify the defects that could occur on the PCB using neural network paradigm. The algorithms to segment the image into basic primitive patterns, enclosing the primitive patterns, patterns assignment, patterns normalization, and classification have been developed based on binary morphological image processing and Learning Vector Quantization (LVQ) neural network. …”
    Get full text
    Get full text
    Article
  10. 10

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Machine learning as new approach for predicting of maxillary sinus volume, a sexual dimorphic study by Hamd, Zuhal Y., Aljuaid, Hanan, Alorainy, Amal I., Osman, Eyas G., Abuzaid, Mohamed, Elshami, Wiam, Elhussein, Nagwan, Gareeballah, Awadia, Pathan, Refat Khan, Naseer, K.A., Khandaker, Mayeen Uddin *, Ahmed, Wegdan

    Published 2023
    “…In this retrospective study, we used data from 150 patients with normal maxillary sinuses to train and evaluate a Python ML algorithm for its ability to predict MSV from basic patient demographics (age, gender) and sinus length measurements in three directions (anteroposterior, mediolateral, and superoinferior). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Deep learning-based breast cancer detection and classification using histopathology images / Ghulam Murtaza by Ghulam , Murtaza

    Published 2021
    “…For BrC detection, an efficient and reliable model namely Ensemble BrC Detection Network (EBrC-Net) and three misclassification reduction (McR) algorithms are developed. The proposed EBrC-Net model is based on deep learning (DL) based approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Mean of correlation method for optimization of affective states detection in children by Rusli, Nazreen, Sidek, Shahrul Na'im, Md Yusuf, Hazlina, Ishak, Nor Izzati

    Published 2018
    “…With the requirement of having the measuring device attached to the body approach, distraction of the subject normally masks the true affective states of the subject due to discomfort. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Inversion of 2D and 3D DC resistivity imaging data for high contrast geophysical regions using artificial neural networks / Ahmad Neyamadpour by Neyamadpour, Ahmad

    Published 2010
    “…These results show that,for all the arrays (2D and 3D) except 3D pole - dipole data, resilient propagation is the most efficient algorithm for training the DC resistivity data. In the case of 3D study of pole - dipole data, the gradient descent with momentum and an adaptive learning rate algorithm is found to be the most efficient paradigm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
    Get full text
    Get full text
    Thesis