Search Results - (( java implementation modified algorithm ) OR ( using table learning algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- learning algorithm »
- table learning »
- using table »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
4
Development of a diversified ensemble data summarization (DDS) tool for learning medical data in a multi relational environment
Published 2012“…This can be achieved by summarizing each table that exists in the database by using a more appropriate data summarization method depending on the type of data stored in each individual table. …”
Get full text
Get full text
Research Report -
5
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
6
An evolutionary based features construction methods for data summarization approach
Published 2015“…The DARA algorithm will be applied to summarize data stored in the non-target tables by clustering them into groups, where multiple records stored in nontarget tables correspond to a single record i,tored in a target table. …”
Get full text
Get full text
Research Report -
7
-
8
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
Published 2023“…Using a Q-learning table, QL-NMR remembers the historical performance of each chaotic map during the S-box construction process allowing just-in-time adaptive selection based on its current performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Deep reinforcement learning to multi-agent deep reinforcement learning
Published 2022“…In fact, overall goal in this paper is a comprehensive explanation of the various Deep Reinforcement Learning (DRL) algorithms, and its combination with Multi-Agent methods. …”
Get full text
Get full text
Article -
10
Integrated geophysical, hydrogeochemical and artificial intelligence techniques for groundwater study in the Langat Basin, Malaysia / Mahmoud Khaki
Published 2014“…These results confirm that, for all the networks the Levenberg-Marquardt algorithm is the most effective algorithm to model the groundwater level. …”
Get full text
Get full text
Thesis -
11
Assessing the efficacy of machine learning algorithms for syncope classification: A systematic review
Published 2024“…The aims of the study were to systematically evaluate available machine learning (ML) algorithm for supporting syncope diagnosis to determine their performance compared to existing point scoring protocols. …”
Get full text
Get full text
Article -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…The training phase of the machine learning algorithm used proposed real-time training datasets benchmarked with two training datasets from CICIDS and NSL-KDD. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. The proposed approaches take the advantages of structured peer-to-peer systems where the contents of peers’ caches are shared using Distributed Hash Table (DHT) in order to enhance the performance of the web caching policy. …”
Get full text
Get full text
Get full text
Article -
15
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
Get full text
Get full text
Conference or Workshop Item -
16
Prediction of oil and gas pipeline failures through machine learning approaches: A systematic review
Published 2023“…It also provides in-depth details, summarized in tables, on different failure types, commonly used ML algorithms, and data resources, with critical discussions. …”
Get full text
Get full text
Article -
17
The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip
Published 2015“…The problems are the pupils not memorized the multiplication tables, error in terms of algorithms, especially involving multiplication of whole numbers with two-digit numbers and errors involving regrouping the product of the multiplication. …”
Get full text
Get full text
Thesis -
18
Automatic personalized student timetable / Siti Aishah Mohamed Amin
Published 2010Get full text
Get full text
Thesis -
19
Fuzzy rules reduction using rough set approach
Published 2003“…Johnson reducer and Genetic Algorithm reducer are the methods used for computing reducts. …”
Get full text
Conference or Workshop Item -
20
