Search Results - (( java implementation modified algorithm ) OR ( knowledge detection based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  6. 6

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  7. 7

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition by Mohd. Hasbullah, Omar

    Published 2011
    “…A blind signal detector, which is known as eigenvalue based detection, was found to be the most desired detector for its detection capabilities, time of execution, and zero a-priori knowledge. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…GAs are search algorithms which are based on the principles of natural selection and genetics. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant by Al-Neami, F. B., Al-Kayiem, Hussain H.

    Published 2008
    “…The recent work presents a new method of fault diagnosis based on artificial neural networks and genetic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Leaf lesion classification (LLC) algorithm based on artificial bee colony (ABC) by Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana, Sainin, Mohd Shamrie, Airuddin, Ahmad

    Published 2015
    “…In this paper, an algorithm to classify leaf disease severity based on lesions is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…Viola-Jones algorithm is utilized for face detection. Upon acquiring the face location, the knowledge-based method is implemented to locate the eye and the mouth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation by Chen, Qipeng, Xiong, Qiaoqiao, Huang, Haisong, Tang, Saihong, Liu, Zhenghong

    Published 2024
    “…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
    Get full text
    Get full text
    Article
  20. 20

    Unsupervised Anomaly Detection with Unlabeled Data Using Clustering by Chimphlee, Witcha, Abdullah, Abdul Hanan, Md. Sap, Mohd. Noor

    Published 2005
    “…We present a clustering-based intrusion detection algorithm, unsupervised anomaly detection, which trains on unlabeled data in order to detect new intrusions. …”
    Get full text
    Get full text
    Conference or Workshop Item