Search Results - (( java implementation modified algorithm ) OR ( learning implementation during algorithm ))
Search alternatives:
- implementation modified »
- implementation during »
- java implementation »
- during algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. Object classification model is produced through the model training with Deep Neural Networks (DNN). …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
7
Autonomous path planning robot using geographical information
Published 2008Get full text
Learning Object -
8
Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Article -
9
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…A maximum accuracy of 81% is obtained for Decision Tree algorithm during the prediction of crime. The findings demonstrate that employing Machine Learning techniques aids in the prediction of criminal events, which has aided in the enhancement of public security.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin
Published 2014“…Bat algorithm was employed to optimize the training parameters such as learning rate, momentum rate and number of neurons in hidden layers. …”
Get full text
Get full text
Thesis -
12
Music Recommender System Using Machine Learning Content-Based Filtering Technique
Published 2022“…In this study, methods of K-Mean Clustering, Euclidean Distance and Cosine Similarity are implemented. These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
Get full text
Get full text
Undergraduates Project Papers -
13
-
14
Optimization of neural network architecture using genetic algorithm for load forecasting
Published 2014“…In this paper, a computational intelligent technique genetic algorithm (GA) is implemented for the optimization of artificial neural network (ANN) architecture. …”
Get full text
Get full text
Conference or Workshop Item -
15
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip
Published 2015“…The study involved 20 respondents were selected based on preliminary observations made in the class during the process of teaching and learning. This study was conducted based on Kurt Lewin's research model involves five main steps of identifying aspects of practice, designing an action plan, implementing the plan of action, the effect of the action, and reflection on all the action. …”
Get full text
Get full text
Thesis -
19
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…History is one of the school subjects in Malaysian schools and known as a compulsory subject that is required to pass the SPM examination. One of the main learning methods in Malaysian education is by using textbooks as it is a universal formal school learning material and a dominant resource of learning. …”
Get full text
Get full text
Thesis -
20
A conceptual model for the E-commerce application recommendation framework using exploratory search
Published 2024journal::journal article
