Search Results - (( java implementation modified algorithm ) OR ( being solution learning algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…Many algorithms have been applied to aid the assessment process. …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman by Seman, Noraini

    Published 2012
    “…However, due to the stochastic nature of this algorithm, the learning process can reach an optimal solution with much higher probability than many standard neural network techniques.…”
    Get full text
    Get full text
    Book Section
  8. 8

    Voltage stability index prediction by using genetics algorithm-based machine learning (GBML) technique / Zainab Mohd Ghazali by Mohd Ghazali, Zainab

    Published 2007
    “…The proposed technique is using Genetic Algorithms-Based Machine Learning (GBML) to predict the voltage stability index. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media Anugerah, Md. Tap, Abu Osman

    Published 2011
    “…Purpose – Prediction accuracies are usually affected by the techniques and devices used as well as the algorithms applied. This work aims to attempt to further devise a better positioning accuracy based on location fingerprinting taking advantage of two important mobile fingerprints, namely signal strength (SS) and signal quality (SQ) and subsequently building a model based on extreme learning machine (ELM), a new learning algorithm for single-hidden-layer neural networks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Extreme learning machine for user location prediction in mobile environment by Mantoro, Teddy, Olowolayemo, Akeem, Olatunji, Sunday O., Ayu, Media A., Abu Osman, Md. Tap

    Published 2011
    “…Purpose – Prediction accuracies are usually affected by the techniques and devices used as well as the algorithms applied. This work aims to attempt to further devise a better positioning accuracy based on location fingerprinting taking advantage of two important mobile fingerprints, namely signal strength (SS) and signal quality (SQ) and subsequently building a model based on extreme learning machine (ELM), a new learning algorithm for single-hidden-layer neural networks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2021
    “…The state of the art of medical application that being implemented are mostly based on common machine learning model. …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Hybrid signal processing and machine learning algorithm for adaptive fault classification of wind farm integrated transmision line protection by Olufemi, Osaji Emmanuel, Othman, Mohammad Lutfi, Hizam, Hashim, Othman, Muhammad Murtadha, Ammar, Aker Elhadi Emhemed Alhaaj, Okeke, Chidiebere Akachukwu, Onuabuchi, Nwagbara Samuel

    Published 2019
    “…The supervised machine learning algorithm from Bayesian network classified 99.15 % faults correctly with the operation time of 0.01 s to produced best-generalized model with an RMS error value of 0.05 for single line-to-ground (SLG) fault identification and classification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2022
    “…The state of the art of medical application that being implemented are mostly based on common machine learning model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION by CATUR ANDRYANI, NUR AFNY

    Published 2010
    “…The proposed training algorithms discussed in this thesis are derived for fixed size RBF network and being compared with Extreme Learning Machine (ELM) as the ELM technique just randomly assigned centers and width of the hidden neurons and update the output connected weights. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Study on crack detection using image processing techniques and deep learning – a survey by Saleem, Muhammad Asif, Senan, Norhalina, Ahmad, Rehan

    Published 2020
    “…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…However, it is observed that there are only a few machine learning solutions to detect phishing attacks on OSNs are being proposed and implemented. …”
    Get full text
    Get full text
    Thesis