Search Results - (( developing reduction learning algorithm ) OR ( java implementation path algorithm ))

Refine Results
  1. 1

    Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer by Ahmad Nezer, Nurul Aqilah

    Published 2017
    “…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…This model relies mainly on dimensionality reduction and machine learning algorithms. The principal component analysis (PCA) and the linear discriminant analysis (LDA) techniques perform the dimensionality reduction in individual and hybrid modes to process and improve the data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…So, the application of the theory as part of the learning models was proposed in this thesis. Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Computationally efficient sequential learning algorithms for direct link resource-allocating networks by Asirvadam , Vijanth Sagayan, McLoone, Sean, Irwin, George W

    Published 2005
    “…Computationally efficient sequential learning algorithms are developed for direct-link resource-allocating networks (DRANs). …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…The experimental results showed that the accuracy of the algorithm over the NSL-KDD dataset was 99.72%, with a memory reduction of 10%. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  18. 18

    A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani by Mahmoud Reza, Saybani

    Published 2016
    “…Many researchers, who have developed methods and algorithms within the field of artificial intelligence, machine learning and data mining, have addressed extracting useful information from the data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
    Get full text
    Get full text
    Article
  20. 20

    Kernel and multi-class classifiers for multi-floor wlan localisation by Abd Rahman, Mohd Amiruddin

    Published 2016
    “…Unlike the classical kNN algorithm which is a regression type algorithm, the proposed localisation algorithms utilise machine learning classification for both linear and kernel types. …”
    Get full text
    Get full text
    Thesis