Search Results - (( java implementation modified algorithm ) OR ( using pca learning algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- pca learning »
- using pca »
-
1
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses machine learning method to detect anomalies in system log files. …”
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
-
4
Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models
Published 2023“…Based on the identical dataset, the GA-BP and PSO-BP algorithms are also compared to the PCA-BAS-ENN algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Heart Disease Risk Prediction using Machine Learning with Principal Component Analysis
Published 2021“…The performance of the algorithms was evaluated using 10-fold cross-validation without and with Principal Component Analysis (PCA). …”
Get full text
Get full text
Conference or Workshop Item -
6
Comparison of machine learning classifiers for dimensionally reduced fMRI data using random projection and principal component analysis
Published 2019“…In addition to that, six different types of machine learning algorithm have been used. In particular, the Haxby dataset is chosen for our experiment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
8
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
9
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
10
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
11
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
12
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
Get full text
Get full text
Get full text
Article -
13
Evaluating integrated weight linear method to class imbalanced learning in video data
Published 2011Get full text
Get full text
Conference or Workshop Item -
14
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
Get full text
Get full text
Get full text
Thesis -
15
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
16
Feature extraction using neocognitron learning in hierarchical temporary memory
Published 2015“…Hierarchical Temporal Memory (HTM) serves as a practical implementation of the memory prediction theory.In order to obtain the optimum accuracy in pattern recognition, it is crucial to apply an appropriate learning algorithm for the feature extraction step of the HTM.This study proposes the use of neocognitron learning in extracting features of the pattern for image recognition.The integration of neocognitron into HTM addresses both the scale and time issues of the HTM. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…It composed of three basic data processing components, which are PCA filter, binary hashing and histograms. PCA is employed for learning multistage filter banks. …”
Get full text
Get full text
Monograph -
18
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
19
Prediction of ADHD from a small dataset using an adaptive EEG theta/beta ratio and PCA feature extraction
Published 2022“…Due to the heterogeneity of ADHD symptoms, several studies have applied machine learning algorithms for enhancing the recognition of ADHD. …”
Get full text
Get full text
Proceeding Paper -
20
Semantic focus fusion based on deep learning for deblurring effect
Published 2024“…In a rapid development of intelligent computation, such as deep learning algorithm, multi-focus image fusion methods indirectly being involved, such as CNN and PCA Net architectures. …”
Get full text
Get full text
Thesis
