Search Results - (( java implementation modified algorithm ) OR ( using pca learning algorithm ))

Refine Results
  1. 1

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses machine learning method to detect anomalies in system log files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Heart Disease Risk Prediction using Machine Learning with Principal Component Analysis by Reddy, K.V.V., Elamvazuthi, I., Aziz, A.A., Paramasivam, S., Chua, H.N.

    Published 2021
    “…The performance of the algorithms was evaluated using 10-fold cross-validation without and with Principal Component Analysis (PCA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Comparison of machine learning classifiers for dimensionally reduced fMRI data using random projection and principal component analysis by Mohd Suhaimi, Nur Farahana, Htike, Zaw Zaw

    Published 2019
    “…In addition to that, six different types of machine learning algorithm have been used. In particular, the Haxby dataset is chosen for our experiment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  8. 8

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…Meanwhile, the unsupervised learning method using PCA-WCC features is good at detecting unknown damage, and is sensitive to low-severity damage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Feature extraction using neocognitron learning in hierarchical temporary memory by Mousa, Aseel, Yusof, Yuhanis

    Published 2015
    “…Hierarchical Temporal Memory (HTM) serves as a practical implementation of the memory prediction theory.In order to obtain the optimum accuracy in pattern recognition, it is crucial to apply an appropriate learning algorithm for the feature extraction step of the HTM.This study proposes the use of neocognitron learning in extracting features of the pattern for image recognition.The integration of neocognitron into HTM addresses both the scale and time issues of the HTM. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…It composed of three basic data processing components, which are PCA filter, binary hashing and histograms. PCA is employed for learning multistage filter banks. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Prediction of ADHD from a small dataset using an adaptive EEG theta/beta ratio and PCA feature extraction by Sase, Takumi, Othman, Marini

    Published 2022
    “…Due to the heterogeneity of ADHD symptoms, several studies have applied machine learning algorithms for enhancing the recognition of ADHD. …”
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Semantic focus fusion based on deep learning for deblurring effect by Ismail, .

    Published 2024
    “…In a rapid development of intelligent computation, such as deep learning algorithm, multi-focus image fusion methods indirectly being involved, such as CNN and PCA Net architectures. …”
    Get full text
    Get full text
    Thesis