Search Results - (( developing supervised learning algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The experimental results demonstrate that the proposed algorithm is competitive compared to the state-of-the-art semi-supervised learning algorithms in terms of accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.] by Mohd Fuzi, Mohd Faris, Mohd Shahirudin, Syamir, Abd Halim, Iman Hazwam, Jamaluddin, Muhammad Nabil Fikri

    Published 2023
    “…To improve the detection accuracy for future research, it is suggested that the malware dataset be enhanced using several architectures, such as Linux and Android, and use additional supervised and unsupervised machine learning algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Support directional shifting vector: A direction based machine learning classifier by Kowsher, Md., Hossen, Imran, Tahabilder, Anik, Prottasha, Nusrat Jahan, Habib, Kaiser, Zafril Rizal, M Azmi

    Published 2021
    “…There are three main domains named supervised, unsupervised, and reinforcement. Supervised learning mainly deals with regression and classification. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Machine learning approach for automated optical inspection of electronic components by Lim, Siew Kee

    Published 2019
    “…The factor that affecting the confidence level of the supervised machine learning algorithm is discussed. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms by Lei, X., Mohamad, U.H., Sarlan, A., Shutaywi, M., Daradkeh, Y.I., Mohammed, H.O.

    Published 2022
    “…The development of Management Information Systems (MIS) is impossible without the use of machine learning (ML). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    CSC728 - Machine Learning / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2022
    “…The research in Machine Learning has developed into broad areas of AI, the four main thrusts of research are (1) the improvement of classification accuracy by learning ensembles of classifiers, (2) methods for scaling up supervised learning algorithms, (3) reinforcement learning, and (4) the learning of complex stochastic models."…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  14. 14

    CSC728: Machine Learning / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2017
    “…The research in Machine Learning has developed into broad areas of AI, the four main thrusts of research are (1) the improvement of classification accuracy by learning ensembles of classifiers, (2) methods for scaling up supervised learning algorithms, (3) reinforcement learning, and (4) the learning of complex stochastic models."…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  15. 15

    Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction by Mohd Aris, Teh Noranis, Abu Bakar, Azuraliza, Mahiddin, Normadiah, Zolkepli, Maslina

    Published 2024
    “…Therefore, a fuzzy model based on machine learning and data mining is a vital solution. In this study, ten supervised machine learning algorithms namely the J48, Logistic, NaiveBayes Updateable, RandomTree, BayesNet, AdaBoostM1, Random Forest, Multilayer Perceptron, Bagging and Stacking are applied for a simulated diabetes fuzzy dataset, verified by medical experts. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    A review on supervised machine learning for accident risk analysis: challenges in Malaysia by Choo, Boon Chong, Abdul Razak, Musab, Awang Biak, Dayang Radiah, Mohd Tohir, Mohd Zahirasri, Syafiie, S.

    Published 2022
    “…This review observed how the IR 4.0 approaches were used in the risk analysis, especially on supervised machine learning. This study also highlights the finding from the previous works on challenges in utilizing supervised machine learning, which is the need to have publicly accessible large database from industries and agencies such as the Department of Occupational Safety and Health (DOSH) Malaysia for the development of algorithms, which can potentially improve accident risk analysis and safety, especially for Malaysian industries.…”
    Get full text
    Get full text
    Article