Search Results - (( moderation classifications learning algorithm ) OR ( java implementation modified algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance analysis of machine learning algorithms for classification of infection severity levels on rubber leaves by Mat Lazim, Siti Saripa Rabiah, Sulaiman, Zulkefly, Mat Nawi, Nazmi, Mohd Mustafah, Anas

    Published 2023
    “…Thus, this study was carried out to investigate the potential application of spectroscopic technology and machine learning algorithms to classify severity level of infected trees at early stage based on spectral data. …”
    Get full text
    Get full text
    Get full text
    Book Section
  3. 3

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
    Review
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq by Uzair , Ishtiaq

    Published 2024
    “…Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI) by Ganasan, Shatiskumar, Norazlianie, Sazali

    Published 2024
    “…Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Classification of Mental Health Level of Students Using SMOTE and Soft Voting Ensemble Classifier and the DASS-21 Profile by Muhammad Imron, Rosadi, Khoirun, Nisa, Nanik, Kholifah

    “…It leverages the Synthetic Minority Over-sampling Technique (SMOTE) to address the class imbalance in the dataset and employs a Voting Ensemble with soft voting to combine several base algorithms (Logistic Regression, Random Forest, Gradient Boosting, and XGBoost/SVM) for accurate prediction of mental health levels (normal, mild, moderate, severe, very severe). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Complexity Analysis of EEG in Patients With Social Anxiety Disorder Using Fuzzy Entropy and Machine Learning Techniques by Al-Ezzi, A., Al-Shargabi, A.A., Al-Shargie, F., Zahary, A.T.

    Published 2022
    “…The main objective of this study is to analyze the electroencephalogram (EEG) complexity of 88 SAD subjects, subdivided into 4 balanced groups (22 severe, 22 moderate, 22 mild, and 22 healthy controls (HCs) using Fuzzy Entropy measure (FE) and machine learning algorithms. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…As the ALOS PALSAR-2 image was evaluated with dual-polarization (HH and HV), each digitized point has two distinct backscatter data with four severity levels (T0 to T3). The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Investigating the relationship between the urban heat island effect and short-duration extreme rainfall in Kuala Lumpur by Tan, Yan Kai

    Published 2025
    “…LULC classification was performed using Support Vector Machine (SVM) and Random Forest (RF) algorithms, while LST was estimated using the Single Channel (SC) algorithm and surface urban heat island intensity (SUHII) was subsequently derived from the LST data. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review by Ibrahim, Buhari, Suppiah, Subapriya, Ibrahim, Normala, Mohamad, Mazlyfarina, Abu Hassan, Hasyma, Syed Nasser, Nisha, Saripan, M. Iqbal

    Published 2021
    “…We conducted a systematic review aimed at determining the diagnostic power of rs-fMRI to identify FC abnormalities in the DMN of patients with AD or MCI compared with healthy controls (HCs) using machine learning (ML) methods. Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Assessment of near-infrared and mid-infrared spectroscopy for early detection of basal stem rot disease in oil palm plantation by Liaghat, Shohreh

    Published 2013
    “…Reflectance spectra were pre-processed and principal component analysis (PCA) was performed to obtain PC scores as input features used in different pattern recognition algorithms in order to select the best learning model of Ganoderma discrimination. …”
    Get full text
    Get full text
    Thesis