Search Results - (( java implementation modified algorithm ) OR ( using content machine algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…The objective of this project is to develop a music recommendation system using one of the Machine Learning techniques which is content-based filtering technique. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    DNA enhancer prediction using machine learning techniques with novel feature representation by Fong, Pui Kwan

    Published 2016
    “…Current computational enhancer prediction tools are centred at Support Vector Machine (SVM) utilizing sequence content feature—the k-mer. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…Also, It will improve the level of privacy and authenticity of these platforms and related users. The research uses the bot detection technique based on machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Using Machine Learning Algorithms to Estimate the Compressive Property of High Strength Fiber Reinforced Concrete by Dai, L., Wu, X., Zhou, M., Ahmad, W., Ali, M., Sabri, M.M.S., Salmi, A., Ewais, D.Y.Z.

    Published 2022
    “…The considered parameters were cement content, fly ash content, slag content, silica fume content, nano-silica content, limestone powder content, sand content, coarse aggregate content, maximum aggregate size, water content, super-plasticizer content, steel fiber content, steel fiber diameter, steel fiber length, and curing time. …”
    Get full text
    Get full text
    Article
  11. 11

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
    Get full text
    Article
  12. 12
  13. 13

    Evaluation of rehearsal effects of multimedia content based on EEG using machine learning algorithms by Mazher, M., Aziz, A.A., Malik, A.S.

    Published 2017
    “…This paper will present the rehearsal effects based on electroencephalography (EEG) recorded data for multimedia contents. Three frequency based features are used to discriminate the three learning states mentioned as L1, L2 and L3 using machine learning algorithms. …”
    Get full text
    Get full text
    Article
  14. 14

    Computer algorithm for automated detection of intramedullary rod hole position and orientation / Ahmad Zulhilmi Mohd Ziyadi by Mohd Ziyadi, Ahmad Zulhilmi

    Published 2014
    “…The biggest and hardest is the system must able to recognize an X-ray image and all the relevant content inside it. Therefore to close the gap between manual and automatic, automatic image recognition system using machine vision algorithm must be developed. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…To meet this requirement, a new Multi LMS (MLMS) model using Sharable Content Object Reference Model (SCORM) specifications to share learning materials among different higher learning institutions (HLIs) has been presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A machine learning approach to tourism recommendations system by Chia, An

    Published 2025
    “…To overcome this problem, this project implements machine learning algorithms with collaborative filtering, content-based filtering and hybrid filtering approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Overview of textual anti-spam filtering techniques by Subramaniam, T., Jalab, H.A., Taqa, A.Y.

    Published 2010
    “…This paper summarizes most common techniques used for anti-spam filtering by analyzing the e-mail content and also looks into machine learning algorithms such as Naive Bayesian, support vector machine and neural network that have been adopted to detect and control spam. …”
    Get full text
    Article
  19. 19

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…However, these surveys are not covered for both IC-MFD algorithms based hand-crafted features and IC-MFDs algorithms based machine-crafted features. …”
    Article
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis