Search Results - (( developing learning adoption algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    On Adopting Parameter Free Optimization Algorithms for Combinatorial Interaction Testing by Kamal Z., Zamli, Alsariera, Yazan A., Nasser, Abdullah B., Alsewari, Abdulrahman A.

    Published 2015
    “…In doing so, this paper reviews two existing parameter free optimization algorithms involving Teaching Learning Based Optimization (TLBO) and Fruitfly Optimization Algorithm (FOA) in an effort to promote their adoption for CIT.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. Machine learning algorithms have widely been adopted recently to enhance the performance of IDSs. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Correlation model in the adoption of E-payment services: A machine learning approach by Tan, Xi En

    Published 2022
    “…This is a novel method, as we do not need to rely on statistical analysis, rather we can automate the process of identifying important features using machine learning models. The end goal of the project is to develop a model that identifies the important features that affect user intention to adopt e-payment.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Phylogenetic tree classification system using machine learning algorithm by Tan, Jia Kae

    Published 2015
    “…This study adopted supervised machine learning algorithm which is the Support Vector Machine (SVM) for classification. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10
  11. 11

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…Transfer Learning is one of the common methods. Various algorithms under Transfer Learning had been developed for different applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Testing the use of machine learning for heritage property valuation / Junainah Mohamad, Nur Shahirah Ja’afar and Suriatini Ismail by Mohamad, Junainah, Ja’afar, Nur Shahirah, Ismail, Suriatini

    Published 2021
    “…However, the application of machine learning in heritage property valuation has limited adoption. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Owing to its proven performance in many other optimization problems, the adoption of the parameter-free Teaching Learning-based Optimization (TLBO) algorithm as a new t-way strategy is deemed useful. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Software module clustering based on the fuzzy adaptive teaching learning based optimization algorithm by Kamal Z., Zamli, Fakhrud, Din, Nazirah, Ramli, Ahmed, Bestoun S.

    Published 2019
    “…This paper describes the adoption of Fuzzy Adaptive Fuzzy Teaching Learning based Optimization (ATLBO) for software module clustering problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Hybrid Intelligent Warning System for Boiler tube Leak Trips by Singh, D., Ismail, F.B., Shakir Nasif, M.

    Published 2017
    “…The Extreme Learning Machine (ELM) methodology was also adopted in IWS-1 and compared with traditional training algorithms. …”
    Get full text
    Get full text
    Article
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20