Search Results - (( java implementation modified algorithm ) OR ( using context machine algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Integrated Features by Administering the Support Vector Machine of Translational Initiations Sites in Alternative Polymorphic Context by Nanna Suryana, Herman, Burairah, Hussin

    Published 2012
    “…In this study, support vector machines (SVM) is employed to recognize the patterns for studied translational initiation sites in alternative weak context. …”
    Get full text
    Get full text
    Article
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…Furthermore, the taxonomy was used to evaluate the most recent machine learning algorithm and analysis. …”
    Article
  8. 8

    Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.] by Saad, Nor Liza, Khairudin, Nurkhairizan, Azizan, Azilawati, Abd Rahman, Abdullah Sani, Ibrahim, Roslina

    Published 2022
    “…This paper provides the fundamental knowledges on machine learning design and evaluation useful in the tourist mobile application with context-aware recommender system.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…As per the findings, the RF algorithm attained the maximum accuracy of 77% in the context of PIDD. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…These steps resulted in consistent enhancements of approximately 10.41% and 16.58% for milling and drilling machining, respectively. Furthermore, high-performing Ant Colony Optimization (ACO) algorithms were used to optimize the travel path time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    FACIAL RECOGNITION AT GATED COMMUNITY by Mirza Kelana, Muhammad Hilmi

    Published 2021
    “…Machine learning in the facial detection context can be trained to recognize faces by using an algorithm for it to perform its task such as training and testing process for accuracy of face recognition. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Suicide and self-harm prediction based on social media data using machine learning algorithms by Abdulrazak Yahya, Saleh, Fadzlyn Nasrini, Mostapa

    Published 2023
    “…In combined with robust machine learning algorithms, social networking data may provide a potential path ahead. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Detection on ambiguous software requirements specification written in malay using machine learning by Zahrin, Mohd Firdaus

    Published 2017
    “…Hence, we propose a framework to detect ambiguity on SRS using supervised machine learning technique. Four (4) SRS have been collected as our case study and text mining technique is used to classify the ambiguity and unambiguity requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Prediction of payment method in convenience stores using machine learning by Pratondo, Agus, Novianty, Astri, Pudjoatmodjo, Bambang

    Published 2023
    “…This study explores the application of machine learning techniques, specifically the Random Forest algorithm, to predict payment modes in the context of the Indonesian community. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…Motivating by these drawbacks, this research proposes a new model of dialogue act recognition in which dynamic Bayesian machine learning is applied to induce dynamic Bayesian networks models from task-oriented dialogue corpus using sets of lexical cues selected automatically by means of new variable length genetic algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Behavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications by Aun, Yichiet

    Published 2018
    “…This thesis identified domain-specific features that are effective for accurate, large-scale and scalable mobile applications classification using machine learning techniques. This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.…”
    Get full text
    Get full text
    Thesis