Search Results - (( developing negative detection algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- implementation learning »
- developing negative »
- java implementation »
- negative detection »
- learning algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
5
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017“…This project presents a novel intelligence that inspired by immune system or specifically the Artificial Immune System. The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
Get full text
Get full text
Thesis -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
Published 2018“…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
9
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Computer aided detection Computer aided detection (CAD) is a tool developed to assist radiologist interpretations from diagnostic modalities to decrease observational oversights or false negative rates. …”
Get full text
Get full text
Thesis -
10
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…IP-PBX face challenges in detecting and mitigating malicious traffic. In this research, Support Vector Machine (SVM) machine learning detection & prevention algorithm were developed to detect this type of attacks Two other techniques were benchmarked decision tree and Naïve Bayes. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…Then, the percentage of detection accuracy was used to compare the detection performance of all five algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Haar cascade algorithm for microsleep detection
Published 2025“…During the development phase, the system was built in Python using OpenCV and dlib for real-time facial analysis and the Haar Cascade algorithm for efficient facial feature detection. …”
Get full text
Get full text
Article -
13
Academic leadership bio-inspired classification model using negative selection algorithm
Published 2015“…Negative selection algorithm has been successfully used in several purposes such as in fault detection, data integrity protection, virus detection and etc.due to the unique ability in self-recognition by classifying self or non-self’s detectors. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. …”
Get full text
Get full text
Get full text
Article -
16
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis -
17
Automated negative lightning return strokes characterization using brute-force search algorithm
Published 2022“…Moreover, the characterization mainly on the negative return strokes also significantly contributed to the development of the lightning detection system. …”
Get full text
Get full text
Get full text
Article -
18
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
20
Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki
Published 2024“…A user-friendly desktop prototype was developed, and users may upload handwritten samples and get immediate results for the dyslexia handwriting type (normal or reversal) and status of handwriting (detect or not detect). …”
Get full text
Get full text
Thesis
