Search Results - (( linear visualization learning algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  3. 3

    Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization by Razali, Mohd Norhisham, Ibrahim, Norizuandi, Hanapi, Rozita, Mohd Zamri, Norfarahzila, Abdul Manaf, Syaifulnizam

    Published 2023
    “…Future research can explore more advanced machine learning algorithms, incorporate time-series analysis for temporal dependencies, and expand data collection from diverse organizational settings to improve the generalizability of predictive models.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Exploring employee working productivity: initial insights from machine learning predictive analytics and visualization / Mohd Norhisham Razali ... [et al.] by Razali, Mohd Norhisham, Ibrahim, Norizuandi, Hanapi, Rozita, Mohd Zamri, Norfarahzila, Abdul Manaf, Syaifulnizam

    Published 2023
    “…Future research can explore more advanced machine learning algorithms, incorporate time-series analysis for temporal dependencies, and expand data collection from diverse organizational settings to improve the generalizability of predictive models.…”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…These algorithms could not compensate for the change or variation on the inspected parts dynamically. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh by Sai , Chong Yeh

    Published 2020
    “…Furthermore, wavelet-ICA in conjunction with machine learning algorithm successfully removed target artifacts, while largely retaining the EEG source signals of interest. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Predicting the onset of acute coronary syndrome events and in-hospital mortality using machine learning approaches / Song Cheen by Song , Cheen

    Published 2023
    “…This study used a comprehensive methodology to investigate the relationship between air pollution and ACS patient outcomes utilizing machine learning (ML) algorithms, including: 1) Linear Regression, 2) Logistic Regression, 3) Support Vector Machine (SVM), 4) Random Forest (RF), 5) XGBoost, 6) Naïve Bayes (NB), and 7) Stacked Ensemble ML utilizing data from the National Cardiovascular Disease Database (NCVD) Malaysia registry and air quality data from the Department of Environment (DOE) Malaysia. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Hybridization Of Optimized Support Vector Machine And Artificial Neural Network For The Diabetic Retinopathy Classification Problem by Kader, Nur Izzati Ab

    Published 2019
    “…Hence, this research aims to obtain optimal or near-optimal performance value in the study of diabetic classification using supervised machine learning. There are many algorithms available for classification purpose such as k-Nearest Neighbour, k-Means, Support Vector Machine, Decision Tree, Artificial Neural Network and Linear Discriminant Analysis. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Texture-based classification of workpiece surface images using the support vector machine by Ashour, Mohammed Waleed, Abdul Halin, Alfian, Khalid, Fatimah, Abdullah, Lili Nurliyana, Darwish, Samy H.

    Published 2015
    “…Machine vision can be used to semi- or fully automate this identification process by firstly extracting features from captured workpiece images, followed by analysis using machine learning algorithms. This enables inspection to be performed more reliably with minimal human intervention. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Solubility enhancement of decitabine as anticancer drug via green chemistry solvent: Novel computational prediction and optimization by Nader Ibrahim Namazi, Sameer Alshehri, Rawan Bafail, Bader Huwaimel, Amal M. Alsubaiyel, Ali H. Alamri, Ahmed D. Alatawi, Hossam Kotb, Mohd Sani Sarjadi, Md. Lutfor Rahman, Mohammed A.S. Abourehab

    Published 2022
    “…One of the two input features is P (bar) and the other is T (k). ADA-DT (Adaboost Algorithm Decision Tree), ADA-LR (Adaboost Algorithm-Linear Regresion), and ADA-GRNN (Generative Regression Neural Network) models showed MAE of 6.54 ˣ 10ˉ⁵, 4.66 10 ˉ⁵, and 8.35 10 ˉ⁵, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Predicting saliency existence using reduced salient features based on compactness and boundary cues by Nadzri, Nur Zulaikhah

    Published 2020
    “…The selected salient features were trained, tested and compared on 3 learning algorithms which included generalised linear regression, Naïve Bayes, and Support Vector Machine. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis