Search Results - (( java implementation modified algorithm ) OR ( pattern learning process algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- process algorithm »
- pattern learning »
- learning process »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…There are two general paradigms for pattern recognition classification which are supervised and unsupervised learning. …”
Get full text
Get full text
Thesis -
3
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects:Conference paper -
4
Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm
Published 2023Article -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
A Divide-and-Distribute Approach to Single-Cycle Learning HGN Network for Pattern Recognition
Published 2010“…Distributed Hierarchical Graph Neuron (DHGN) is a single-cycle learning distributed pattern recognition algorithm, which reduces the computational complexity of existing pattern recognition algorithms by distributing the recognition process into smaller clusters. …”
Get full text
Get full text
Conference or Workshop Item -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
8
Financial time series predicting using machine learning algorithms
Published 2013“…Thereafter, Artificial Neural Network (ANN) and Support Vector Machine (SVM) algorithms are implemented separately to train with the trend patterns for predicting the movement direction of financial trends. …”
Get full text
Thesis -
9
Effect of chaos noise on the learning ability of back propagation algorithm in feed forward neural network
Published 2010Get full text
Working Paper -
10
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
11
Development of a scaled conjugate gradient algorithm for significant RF neural signal processing
Published 2025“…Artificial Neural Networks (ANN) are computational models inspired by the human brain, capable of recognizing patterns and making predictions. Scale Conjugate Gradient (SCG) algorithm is an efficient training method for ANN that accelerates the learning process and improves output accuracy. …”
Get full text
Get full text
Get full text
Article -
12
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
Get full text
Get full text
Article -
13
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
14
A New Probabilistic Output Constrained Optimization Extreme Learning Machine
Published 2023“…Benchmarking; Classification (of information); Constrained optimization; Decision making; Electric power systems; Iterative methods; Knowledge acquisition; Learning algorithms; Pattern recognition; Probability; Confidence threshold; Decision making process; Extreme learning machine; Machine learning approaches; Pattern classification problems; Post-processing procedure; Power system applications; Probabilistic output; Machine learning…”
Article -
15
-
16
Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks
Published 2014“…EFMM and EFMM2, are proposed to address a number of limitations in the original FMM learning algorithm. In EFMM, three heuristic rules are introduced to improve the hyperbox expansion, overlap test, and contraction processes. …”
Get full text
Get full text
Thesis -
17
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
18
IncSPADE: An Incremental Sequential Pattern Mining Algorithm Based on SPADE Property
Published 2016Get full text
Get full text
Get full text
Book Chapter -
19
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor / Muhammad Nasrul Hakim Adenan
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Thesis -
20
Neural network algorithm development for Ion Sensitive Field Effect Transistor (ISFET) sensor: article / Muhammad Nasrul Hakim Adenan and Maizatul Zolkapli
Published 2013“…Backpropagation is used as the learning method of ANN model. The algorithm will be developed in MATLAB. …”
Get full text
Get full text
Article
