Search Results - (( developing learning based algorithm ) OR ( java data extraction algorithm ))

Refine Results
  1. 1

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Sentiment Analysis is a field that deals with the problem of identifying and extracting sentiment (or opinion) from data (particularly textual data). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE by Rosyid Ridlo, Al Hakim, Rianti Y., Kisworini, Aditia P., Hamid, Agung, Pangestu, Ariep, Jaenul, Yanuar Zulardiansyah, Arief

    Published 2021
    “…Technological advances make learning media usable on Android devices. This study aims to design learning media algorithms and data structures based on Android. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  11. 11

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…So far, limited genetic-based clustering ensemble algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    E4ML: Educational Tool for Machine Learning by Sainin, Mohd Shamrie, Siraj, Fadzilah

    Published 2003
    “…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    Article
  16. 16

    Performance of correlational filtering and deep learning based single target tracking algorithms / ZhongMing Liao and Azlan Ismail by ZhongMing, Liao, Ismail, Azlan

    Published 2023
    “…Therefore, reviewing the visual target tracking algorithms based on deep learning from different perspectives is important. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A review of object detection in traffic scenes based on deep learning by Zhao, Ruixin, Tang, SaiHong, Supeni, Eris Elianddy, Abdul Rahim, Sharafiz, Fan, Luxin

    Published 2024
    “…This survey is based on the theory of deep learning. It systematically summarizes the Development and current research status of object detection algorithms, and compare the characteristics, advantages and disadvantages of the two types of algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Lexicon-based and immune system based learning methods in Twitter sentiment analysis by Jantan, Hamidah, Drahman, Fatimatul Zahrah, Alhadi, Nazirah, Mamat, Fatimah

    Published 2016
    “…In future work, the accuracy of proposed model can be strengthened by comparative study with other heuristic based searching algorithms such as genetic algorithm, ant colony optimization, swam algorithms and etc.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item