Search Results - (( java implementation modified algorithm ) OR ( using least learning algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr... by Sammen S.S., Ehteram M., Sheikh Khozani Z., Sidek L.M.

    Published 2024
    “…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
    Article
  6. 6

    An application of genetic algorithm and least squares support vector machine for tracing the transmission loss in deregulated power system by M. W., Mustafa, H., Shareef, M. H., Sulaiman, S. N., Abd. Khalid, S. R., Abd. Rahim, Omar, Aliman

    Published 2011
    “…The idea is to use GA as an optimizer to find the optimal values of hyper-parameters of LS-SVM and adopt a supervised learning approach to train the LS-SVM model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An efficient fuzzy C-least median clustering algorithm by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Nizamuddin, Mohammed Khaja, Aboosalih, K C

    Published 2021
    “…Clustering is a kind of unsupervised data mining technique which describes general working behavior, pattern extraction and extracts useful information from time series data. In this paper we are discussing our new procedure for clustering called Fuzzy C-least median of squares algorithm which is an improvement to Fuzzy C-means (FCM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…To overcome this limitation, the Q-Learning algorithm was proposed by several researchers to minimise randomness. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Tracing the real power transfer of individual generators to loads using least squares support vector machine with continuous genetic algorithm by Mohd Wazir, Mustafa, Saifulnizam, Abd.Khalid, Mohd Herwan, Sulaiman, Siti Rafidah, Abd Rahim, Omar, Aliman, Shareef, Hussain

    Published 2011
    “…The idea is to use CGA to find the optimal values of regularization parameter, γ and Kernel RBF parameter, σ 2 , and adapt a supervised learning approach to train the LS-SVM model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm by Ibrahim, Hamidah, Yasin, Waheed, Abdul Hamid, Nor Asilah Wati, Udzir, Nur Izura

    Published 2014
    “…Moreover, cache pollution is a drawback of traditional web caching policies such as Least Frequently Used (LFU), Least Recently Used (LRU), and Greedy Dual Size (GDS) where web objects that are stored in the cache are not visited frequently. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Predicting dengue transmission rates by comparing different machine learning models with vector indices and meteorological data by Ong, Song Quan, Pradeep Isawasan, Ahmad Mohiddin Mohd Ngesom, Hanipah Shahar, As’malia Md Lasim, Gomesh Nair

    Published 2023
    “…Previous work has focused only on specific weather variables and algorithms, and there is still a need for a model that uses more variables and algorithms that have higher performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Learning to Filter Text in Forum Malay Message using Naive Bayesian Technique by Ab. Halim, Norhadila

    Published 2006
    “…The paper explains about me use of the basic naive Bayesian algorithm to classify forum messages whether clean or bad where clean message has no bad words, while bad message contains at least one bad word. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Improved intrusion detection algorithm based on TLBO and GA algorithms by Aljanabi, Mohammad, Mohd Arfian, Ismail

    Published 2021
    “…Optimization algorithms are widely used for the identification of intrusion. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Robust incremental growing multi-experts network by Loo, C.K., Rajeswari, M., Rao, M.V.C.

    Published 2006
    “…Thus, the two proposed robust learning methods namely robust least mean squares (RLMSs) and least mean log squares (LMLSs) are insensitive to the presence of outliers unlike the least mean squares (LMSs) cost function. …”
    Get full text
    Get full text
    Article