Search Results - (( java implementation modified algorithm ) OR ( using gap learning algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- gap learning »
- using gap »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Pso-svr algorithm for accurate ZnO energy band gap prediction
Published 2025“…An artificial algorithm using a machine learning approach could be used to determine the energy band gap, Eg which would simply the process of synthesizing ZnO properties. …”
Get full text
Get full text
Get full text
Article -
6
A Systematic Review Of Machine Learning Algorithms For Mental Health Detection Using Social Media Data
Published 2026journal::journal article -
7
Tree-based machine learning in classifying reverse migration/ Azreen Anuar, Nur Huzeima Mohd Hussain and Hugh Byrd
Published 2023“…However, there is a scarcity of studies that have applied machine learning algorithms to this problem. This paper aims to fill the gap in the literature by discussing the application of machine learning algorithms for predicting reverse migration. …”
Get full text
Get full text
Get full text
Article -
8
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
9
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
Published 2020“…To test the effectiveness of the proposed algorithm, the real and generated samples is added to training phase to build a prediction model using M5 Model Tree. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review
Published 2023“…This review paper summarizes research on the hybrid of constraint-based models and machine learning algorithms in optimizing valuable metabolites. …”
Get full text
Get full text
Get full text
Article -
11
Feasibility comparison of HAC algorithm on usability performance and self-reported metric features for MAR learning
Published 2023Conference Paper -
12
Herbs recognition based on chemical properties using machine learning algorithm
Published 2023“…This method has demonstrated promising results in identifying herb species, and the classification method based on machine learning algorithms has proven successful in recognizing and distinguishing herb species…”
Get full text
Get full text
Article -
13
An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis
Published 2022“…The k-means and the Gaussian mixture distribution were adopted as the clustering algorithms and each algorithm was tested on four datasets with four distinct clustering evaluation criteria: Calinski-Harabasz, Davies-Bouldin, Gap and Silhouette. …”
Get full text
Get full text
Get full text
Book Chapter -
14
Investigating photovoltaic solar power output forecasting using machine learning algorithms
Published 2023Article -
15
Evaluating different machine learning models for predicting municipal solid waste generation: a case study of Malaysia
Published 2025“…Therefore, one of the aims of this research was to investigate the use of machine learning algorithms and its benefits. …”
Article -
16
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
17
Usability prioritization using performance metrics and hierarchical agglomerative clustering in MAR-learning application
Published 2023Conference Paper -
18
A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee
Published 2023“…The proposed deep learning model renders faster without the use of SMOTE. …”
Get full text
Get full text
Get full text
Thesis -
19
Nutrilife: Empowering health with diet and nutrition app
Published 2024“…Using MediaPipe and deep learning algorithms, the app track and analyses users' movements during exercises such as squats and bicep curls, providing corrections to improve technique. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…This study aims to address the existing gaps in the literature by conducting a comprehensive survey on the use of attack graphs for vulnerability assessment in IoT networks. …”
Review
