Search Results - (( java simulation optimization algorithm ) OR ( usage learning techniques algorithm ))

Refine Results
  1. 1

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources. A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…The proposed algorithm is known as the enhance ant colony optimization (EACO). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  7. 7

    BFEDroid: A Feature Selection Technique to Detect Malware in Android Apps Using Machine Learning by Chimeleze C., Jamil N., Ismail R., Lam K.-Y., Teh J.S., Samual J., Akachukwu Okeke C.

    Published 2023
    “…Android (operating system); Android malware; Classification (of information); Feature Selection; Learning systems; Mobile security; Android apps; Classification models; Feature weight; Features selection; Machine learning algorithms; Machine-learning; Malware detection; Malwares; Memory usage; Selection techniques; Learning algorithms…”
    Article
  8. 8

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Resource management in grid computing using ant colony optimization by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2011
    “…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Music Recommender System Using Machine Learning Content-Based Filtering Technique by Foong, Kin Hong

    Published 2022
    “…These are the popular algorithm for unsupervised learning, a machine learning method to analyse and cluster datasets. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Feature selection in intrusion detection, state of the art: A review by Rais, H.M., Mehmood, T.

    Published 2016
    “…By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. In this paper implementation of different feature selection techniques have been reviewed. …”
    Get full text
    Get full text
    Article
  15. 15

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A COLLABORATIVE FRAMEWORK FOR ANDROID MALWARE IDENTIFICATION USING DYNAMIC ANALYSIS by Thayaaleni, Rajandran

    Published 2019
    “…The project proposed a dynamic analysis technique in Android malware detection. The objectives of the project are to investigate the Android malware using dynamic analysis technique and to enhance the accuracy of malware detection. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.] by Mat, Nur Haziqah, Ahmad Zahida, Athifa Aisha, Abdul Malik, Siti Nurhaliza, Azmadi, Nur Athirah Syuhada, Senin, Syahrul Fithry

    Published 2021
    “…To overcome the issues, datasets of reinforced concrete damage images are intelligently trained and classified by selected Machine Learning algorithms such as Naïve- Bayesian, Discriminant Analysis, K-Nearest Neighbor, and Support Vector Machine. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…Thus, an accurate automated technique for timely detection and classification is needed to cope with the aforementioned challenges.There exist techniques grounded on machine learning and deep learning procedures that use the existing dataset i.e., â��The Plant Village Datasetâ�� and perform classification into only two classes in potato leaves. …”
    Get full text
    Get full text
    Article
  20. 20

    A novel framework for potato leaf disease detection using an efficient deep learning model by Mahum, R., Munir, H., Mughal, Z.-U.-N., Awais, M., Sher Khan, F., Saqlain, M., Mahamad, S., Tlili, I.

    Published 2022
    “…Thus, an accurate automated technique for timely detection and classification is needed to cope with the aforementioned challenges.There exist techniques grounded on machine learning and deep learning procedures that use the existing dataset i.e., â��The Plant Village Datasetâ�� and perform classification into only two classes in potato leaves. …”
    Get full text
    Get full text
    Article