Search Results - (( java implementation modified algorithm ) OR ( sharing learning process algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Social learning and principal-agent problems in profit sharing contract by Sapuan N.M., Sanusi N.A., Ismail A.G., Wibowo A.

    Published 2023
    “…First, to theoretically examine the profit sharing (mudarabah) contract that produces an optimal distribution of return in the presence of social learning (shuratic process) within the environment of asymmetric information. …”
    Article
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…To meet this requirement, a new Multi LMS (MLMS) model using Sharable Content Object Reference Model (SCORM) specifications to share learning materials among different higher learning institutions (HLIs) has been presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Machine learning cases in clinical and biomedical domains by Che Azemin, Mohd Zulfaezal, Ashimi, Tijani Ahmad, Md Mustafa, Md Muziman Syah

    Published 2018
    “…The evidence found from the verses suggests that ANN shares similar learning process to achieve belief (iman) by analysing the similitudes (amsal) introduced to the algorithm.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An interactively recurrent functional neural fuzzy network with fuzzy differential evolution and its applications by Cheng, Jian Lin, Chih, Feng Wu, Hsueh, Yi Lin, Cheng, Yi Yu

    Published 2015
    “…The traditional differential evolution (DE) method easily gets trapped in a local optimum during the learning process, but the proposed fuzzy differential evolution algorithm can overcome this shortcoming. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…The platform addresses key limitations found in existing resource-sharing platforms, such as the lack of automated content analysis, insufficient content classification, and inadequate support for personalized learning. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Prediction of employee promotion using hybrid sampling method with machine learning architecture / Shahidan Shafie, Soek Peng Ooi and Khai Wah Khaw by Shafie, Shahidan, Soek, Peng Ooi, Khai, Wah Khaw

    Published 2023
    “…The purpose of using eight machine learning algorithms is to find out the most suitable model to predict employee promotion. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour by Pebrianti, Dwi, Ariawan, Angga, Bayuaji, Luhur, Mahdiana, Deni, ,, Rusdah

    Published 2022
    “…This result shows that the proposed method improves the accuracy by 13.3% on single Naive Bayes algorithms and 4% on a single k-NN algorithm. The results obtained show that in the manual process, the average time per job is 1.42 minutes, while by using the proposed method, the average processing time is around 0.03 seconds per job. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    K-Means Clustering Approach for Intelligent Customer Segmentation Using Customer Purchase Behavior Data by Kayalvily, Tabianan, Shubashini, Velu, VInayakumar, Ravi

    Published 2022
    “…It also enables high exposure of the e-offer to gain attention of potential customers. In order to process the collected data and segment the customers, an learning algorithm is used which is known as K-Means clustering. …”
    Get full text
    Get full text
    Article
  17. 17

    Preliminary study on youth lifestyle with regards to energy saving by Salleh N.S.M.

    Published 2023
    “…This research carried out one of the data gathering techniques; survey, to find the level of the youth lifestyle towards energy saving among youth in a higher level-learning institute. This paper shares the processes and algorithm in finding the result of this type of study. …”
    Article
  18. 18

    Energy-Efficient Federated Learning With Resource Allocation for Green IoT Edge Intelligence in B5G by SALH, ADEB, NGAH, RAZALI, Audah, Lukman, SOON KIM, KWANG, ALJALOUD, KHALED A., TALIB, HAIRUL NIZAM

    Published 2023
    “…The transmission of data from IoT devices to the edge nodes leads to large network traffic in the wireless connections. Federated Learning (FL) is proposed to solve the high computational complexity by training the model locally on IoT devices and sharing the model parameters in the edge nodes. …”
    Get full text
    Get full text
    Article
  19. 19

    A study on personalized recommender system using social media by Aishnivya, Balamurugan

    Published 2020
    “…In the research study Naive Bayes Theorem classifier , k-Nearest Neighbor Classifier and Support Vector Machine classifier is used. These machine learning algorithm processes the data set obtained. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article