Search Results - (( java implementation modified algorithm ) OR ( using active machine algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- machine algorithm »
- using active »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui
Published 2019“…One of the major research problems is the computation resources required by machine learning algorithm used for classification for HAR. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset
Published 2023“…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
-
11
EMG Signals Classification on Human Activity Recognition using Machine Learning Algorithm
Published 2021Get full text
Get full text
Conference or Workshop Item -
12
Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm
Published 2018“…Many researchers dealing with smartphone sensors to recognize human activities using machine learning algorithms. In this paper, we proposed One-versus-All (OVA) strategy with relief-f and self-adaptive algorithm to recognize these activities. …”
Get full text
Get full text
Conference or Workshop Item -
13
Investigating optimal smartphone placement for identifying stairs movement using machine learning
Published 2023“…Successful identification of stair movement activity by using a smartphone can significantly contribute to future research and could also prove useful to the wider community such as amputees and those with pathological gait. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
EEG-based emotion recognition using machine learning algorithms
Published 2024“…Thus, this project proposed an optimised machine learning algorithms to classify emotion by analysing brain activity using Electroencephalogram (EEG) signals. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Investigation of An Early Prediction System of Cardiac Arrest Using Machine Learning Techniques
Published 2022“…Random Forest algorithm be used in this study which is got the best performance with 83% accuracy then the other algorithms in WEKA. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
The development of virtual product life cycle design tool using artificial intelligence technique
Published 2008“…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
Get full text
Monograph -
18
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This work employed the use of machine learning approach. Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
19
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…From the past few years, Intrusion Detection Systems (IDS) are employed as a second line of defence and have shown to be a useful tool for enhancing security by detecting suspicious activity. …”
Get full text
Get full text
Get full text
Article -
20
Scheduling With Alternatives Machine Using Fuzzy Inference System And Genetic Algorithm.
Published 2008Get full text
Monograph
