Search Results - (( java implementation modified algorithm ) OR ( using gap learning algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Pso-svr algorithm for accurate ZnO energy band gap prediction by Abd Rahman, Mohd Amiruddin, Mohd Shazali, Nur Athirah, Anak Bundak, Caceja Elyca

    Published 2025
    “…An artificial algorithm using a machine learning approach could be used to determine the energy band gap, Eg which would simply the process of synthesizing ZnO properties. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Tree-based machine learning in classifying reverse migration/ Azreen Anuar, Nur Huzeima Mohd Hussain and Hugh Byrd by Anuar, Azreen, Mohd Hussain, Nur Huzeima, Byrd, Hugh

    Published 2023
    “…However, there is a scarcity of studies that have applied machine learning algorithms to this problem. This paper aims to fill the gap in the literature by discussing the application of machine learning algorithms for predicting reverse migration. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation by Lateh, Masitah bdul

    Published 2020
    “…To test the effectiveness of the proposed algorithm, the real and generated samples is added to training phase to build a prediction model using M5 Model Tree. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Optimizing the production of valuable metabolites using a hybrid of constraint-based model and machine learning algorithms : A review by Kauthar, Mohd Daud, Ananda, Ridho, Suhaila, Zainudin, Chan, Weng Howe, Moorthy, Kohbalan, Nurul Izrin, Md Saleh

    Published 2023
    “…This review paper summarizes research on the hybrid of constraint-based models and machine learning algorithms in optimizing valuable metabolites. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Herbs recognition based on chemical properties using machine learning algorithm by Mohamad Radzi, Nur Fadzilah, Che Soh, Azura, Ishak, Asnor Juraiza, Hassan, Mohd Khair

    Published 2023
    “…This method has demonstrated promising results in identifying herb species, and the classification method based on machine learning algorithms has proven successful in recognizing and distinguishing herb species…”
    Get full text
    Get full text
    Article
  13. 13

    An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis by Tie, K. H., A., Senawi, Chuan, Z. L.

    Published 2022
    “…The k-means and the Gaussian mixture distribution were adopted as the clustering algorithms and each algorithm was tested on four datasets with four distinct clustering evaluation criteria: Calinski-Harabasz, Davies-Bouldin, Gap and Silhouette. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14
  15. 15

    Evaluating different machine learning models for predicting municipal solid waste generation: a case study of Malaysia by Latif S.D., Hazrin N.A.B., Younes M.K., Ahmed A.N., Elshafie A.

    Published 2025
    “…Therefore, one of the aims of this research was to investigate the use of machine learning algorithms and its benefits. …”
    Article
  16. 16
  17. 17
  18. 18

    A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee by Wong , Wen Yee

    Published 2023
    “…The proposed deep learning model renders faster without the use of SMOTE. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Nutrilife: Empowering health with diet and nutrition app by Tan, Yuki Lok Yee

    Published 2024
    “…Using MediaPipe and deep learning algorithms, the app track and analyses users' movements during exercises such as squats and bicep curls, providing corrections to improve technique. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions by Almazrouei O.S.M.B.H., Magalingam P., Hasan M.K., Shanmugam M.

    Published 2024
    “…This study aims to address the existing gaps in the literature by conducting a comprehensive survey on the use of attack graphs for vulnerability assessment in IoT networks. …”
    Review