Search Results - (( java implementation modified algorithm ) OR ( using authentic learning algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Integration of spectroscopy and chemometric analysis for food authentication: a review by Basri, Katrul Nadia

    Published 2025
    “…This paper reviews various types of classification and regression algorithms in chemometric analysis to demonstrate the capabilities of these algorithms for use in food authentication processes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
    text::Thesis
  6. 6

    Prediction of Pakistani Honey Authenticity through Machine Learning by Noureen Fatima, Ghulam Mujtaba, Adnan Akhunzada, Khurshed Ali, Zahid Hussain Shaikh, Baby Rabia, Javed Ahmed Shahani

    Published 2022
    “…Finally, the dataset for predicting the authenticity of Pakistani honey is lacking. Therefore, this study proposes a novel classification model to address the aforementioned weaknesses by classifying the authenticity of Pakistani honey using machine learning algorithms and several physicochemical features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Application of machine learning approach on halal meat authentication principle, challenges, and prospects: a review by Mustapha, Abdul, Ishak, Iskandar, Zaki, Nor Nadiha Mohd, Ismail-Fitry, Mohammad Rashedi, Arshad, Syariena, Sazili, Awis Qurni

    Published 2024
    “…Some of the ML approaches used in Halal meat authentication have proven a high percentage of accuracy in meat authenticity while other approaches show no evidence of Halal meat authentication for now. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    BRAINPRINT AUTHENTICATION UNDER VARYING ENVIRONMENTAL CONDITIONS: MACHINE LEARNING VERSUS DEEP LEARNING by DARIEN, KEEGAN, Liew, Siaw Hong, Tang, SIEW YIN, Choo, Yun Huoy, Stephanie, Chua, SOON, CHONG CHEE

    Published 2026
    “…Traditionally, EEG-based authentication requires a separate feature extraction step prior to the use of machine learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…Secondly, this work designs optimization measures from inertia weight and learning factor to build an improved particle swarm optimization algorithm (IPSO). …”
    Get full text
    Get full text
    Article
  14. 14

    Trust-aware authentication and authorization for IoT: a federated machine learning approach by Ahmed, Kazi Istiaque, Tahir, Mohammad, Lau, Sian Lun, Habaebi, Mohamed Hadi, Ahad, Abdul, Mughees, Amna

    Published 2024
    “…The proposed solution for AA IoT utilizes a trust calculation algorithm based on Federated Learning (FL), which is suitable for IoT environments and enables data privacy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar by Ja'afar, Nur Shahirah

    Published 2021
    “…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
    Get full text
    Get full text
    Thesis
  16. 16

    FACIAL RECOGNITION AT GATED COMMUNITY by Mirza Kelana, Muhammad Hilmi

    Published 2021
    “…Facial recognition nowadays has been a popular choice in biometric authentication where it makes use of machine learning to perform its task of recognizing faces whether it be in a public or private property. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Analysis of optimizers on AlexNet architecture for face biometric authentication system by Mat Ariff, Noor Azwana, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah, Amir Hussin, Amir 'Aatieff

    Published 2022
    “…There have been many techniques suggested for biometric authentication algorithms, however, it can be observed that the Deep Learning approach is significantly more effective and secure than other methods, specifically Convolutional Neural Networks (CNN) with AlexNet architecture for face recognition. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19
  20. 20

    Comparative performance of Convolutional Neural Networks Architecture for face biometric authentication system by Mat Ariff, Noor Azwana, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2021
    “…There are a lot of methods for biometric authentication algorithms that have been proposed but it can be said that the Deep Learning method give much more reliable and secure compared to other methods specifically Convolutional Neural Networks (CNN) for face recognition. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper