Search Results - (( java implementation modified algorithm ) OR ( using modern learning algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- modern learning »
- using modern »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
5
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…However, in modern cryptography, the strength of each cryptographic algorithm should only rely on the secret key(s) used to ensure that there is no trap door embedded in the algorithm. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Detection of Fraud and Non-Fraud Transaction using Machine Learning Algorithm
Published 2022Get full text
Get full text
Final Year Project -
8
A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System
Published 2020“…However, present complex algorithms which are accurate require high processing power using a large size of learning dataset without labelling error. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Object based segmentation and analysis using deep learning algorithm for cats and dogs images
Published 2023“…User intervention is constantly required to perform the segmentation. In addition, the algorithms used for the segmentation are conventional rather than modern deep learning techniques which is inevitably more efficient. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
A bayesian network approach to identify factors affecting learning of Additional Mathematics
Published 2015“…Constraint-based algorithms and score-based algorithms are used to generate the networks into several categories to compare and identify the strong relationships among the factors that affect the students’ learning of the subject. …”
Get full text
Get full text
Get full text
Article -
15
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…We investigate the detection capability based on the fuzzy Q-learning (FQL) algorithm and evaluate it using distribute denial of service attacks (DDoS). …”
Get full text
Get full text
Thesis -
16
Machine learning algorithms on price and rent predictions in real estate: A systematic literature review / Muhamad Harussani Abdul Salam ... [et al.]
Published 2022“…This paper presents the machine learning algorithm applications on the prediction of property prices and rents in real estate. …”
Get full text
Get full text
Conference or Workshop Item -
17
Jawi recognition system
Published 2010“…To improve the recognition of the character, the system uses neural network training algorithm called Supervised Learning to receive new character pattern in order to strengthen the weight of the pixels. …”
Get full text
Get full text
Undergraduates Project Papers -
18
WCBP: A new water cycle based back propagation algorithm for data classification
Published 2016“…Water Cycle algorithm is a modern nature inspired meta-heuristic algorithm to provide derivative-free solution to optimize complex problems. …”
Get full text
Get full text
Article -
19
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…The benefit of this work indicated that the implementation of a feature selection technique plays an important role in machine learning algorithms to increase the performance of detection.…”
Get full text
Get full text
Thesis -
20
Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications
Published 2026“…Intelligent Energy Systems using the Barnacles Mating Optimizer and Evolutionary Mating Algorithm: Foundations, Methods, and Applications reveals the potential of innovative optimization algorithms to support sustainability in modern energy systems. …”
Get full text
Get full text
Get full text
Book
