Search Results - (( java implementation modified algorithm ) OR ( pattern estimation learning algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan by Adenan, Muhammad Nasrul Hakim

    Published 2013
    “…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli by Hakim Adenan, Muhammad Nasrul, Zolkapli, Maizatul

    Published 2013
    “…The ANN makes the model learn the pattern by the sample of inputs and outputs to estimate results or to get more accurate data. …”
    Get full text
    Get full text
    Article
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  5. 5
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Decoding of visual activity patterns from fMRI responses using multivariate pattern analyses and convolutional neural network by Zafar, R., Kamel, N., Naufal, M., Malik, A.S., Dass, S.C., Ahmad, R.F., Abdullah, J.M., Reza, F.

    Published 2017
    “…MVPA-CNN based proposed algorithm is compared with region of interest (ROI) based method and MVPA based estimated values. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by R.Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…In addition, when handling network traffic, the data in network is fast incoming and requires an online learning where immediately response and predict the pattern of network traffic for classification once there is an event or request occur. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Distributed Online Averaged One Dependence Estimator (DOAODE) Algorithm for Multi-class Classification of Network Anomaly Detection System by Badlishah, Ahmad, Nawir, M., Amir, A, Yaakob, N, Mat Safar, A, Mohd Warip, M.N, Zunaidi, I

    Published 2019
    “…In addition, when handling network traffic, the data in network is fast incoming and requires an online learning where immediately response and predict the pattern of network traffic for classification once there is an event or request occur. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Towards a Malay derivational lexicon: learning affixes using expectation maximization by Sulaiman, Suriani, Gasser, Michael, Kubler, Sandra

    Published 2011
    “…We extract the set of affix patterns produced by our algorithm and evaluate them against two references: a list of affix patterns extracted from our hand-segmented derivational wordlist and a derivational history produced by a stemmer.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Zakwan, applies Opposition-Based Learning method to improve the exploration capabilities of SKF algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Deep convolutional neural networks for forensic age estimation: A review by Alkaabi S., Yussof S., Al-Khateeb H., Ahmadi-Assalemi G., Epiphaniou G.

    Published 2023
    “…The article also aims to evaluate various databases and algorithms used for age estimation using facial images and dental images. � 2020, Springer Nature Switzerland AG.…”
    Book Chapter