Search Results - (( _ normalization learning algorithm ) OR ( java application design algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  11. 11

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  12. 12

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…Only the normal traffic predicted by the ML-IDS algorithm will be allowed to enter the network domain, and the route with the fastest delay predicted by the ML-RA is assigned for routing. …”
    Article
  14. 14

    Forensic language of property theft genre based on mathematical formulae and machine learning algorithms / Hana' Abd Razak by Abd Razak, Hana'

    Published 2020
    “…Convolution Neural Network (CNN) using deep learning algorithm is chosen in identifying frequency of movement and execution time of housebreaking crime. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Results show that the proposed algorithm required a learning dataset size as small as 5 samples and was resistant to learning labelling error up to 50%.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Further enhancements might involve including machine learning algorithms to improve the prototype's accuracy by learning from a larger dataset, which would eventually improve the prototype's ability to offer deep understanding into handwriting patterns related to dyslexia.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Based on its simplicity, the K-means algorithm has been used in many fields. This paper proposes improved normalization and standardization techniques for higher purity in K-means clustering experimented with benchmark datasets from UCI machine learning repository and it was found that all the proposed techniques’ performance was much higher compared to the conventional K-means and the three classic transformations, and it is evidently shown by purity and Rand index accuracy results.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20