Search Results - (( developing learning efficient algorithm ) OR ( java optimization strategy algorithm ))

Refine Results
  1. 1

    Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite by Suali, Anjila J., Nuraminah Ramli, Rozmie Razif Othman, Hasneeza Liza Zakaria, Iszaidy Ismail, Nor Shahida Mohd Jamail, Rimuljo Hendradi, Nurol Husna Che Rose

    Published 2025
    “…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). The study compares the performance of WOA with various existing strategies, such as Greedy, Density, TVG, Union, ParaOrder, ReqOrder, ITTDG, AURA, Java Algorithm (CTJ), TTSGA, and AFA. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  3. 3

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Computationally efficient sequential learning algorithms for direct link resource-allocating networks by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2005
    “…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. Machine learning algorithms have widely been adopted recently to enhance the performance of IDSs. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…The present study proposes an efficient DDoS attack detection model. This model relies mainly on dimensionality reduction and machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Integration of image processing algorithm and deep learning approaches to monitor ginger plant by Tan, Cheng Yong

    Published 2024
    “…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding by Mahmoud, Omer, Anwar, Farhat, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…One of the essential factors that affect the performance of Artificial Neural Networks is the learning algorithm. The performance of Multilayer Feed Forward Artificial Neural Network performance in image compression using different learning algorithms is examined in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Integration of image processing algorithm and deep learning approaches to monitor ginger plant by Tan, Cheng Yong

    Published 2024
    “…This study aims to integrate image processing and deep learning algorithms to monitor the growth of ginger plants. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
    thesis::doctoral thesis
  20. 20

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…An efficient iterative algorithm is developed to optimize the objective function of the proposed algorithm since it is non-smooth and difficult to solve. …”
    Get full text
    Get full text
    Get full text
    Thesis