Search Results - (( evolution information integration algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2
  3. 3

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  4. 4
  5. 5
  6. 6

    An improved grey wolf with whale algorithm for optimization functions by Asgher, Hafiz Maaz

    Published 2022
    “…Therefore, to overcome the problem of poor exploration in the GWO the exploration part of the Whale optimization algorithm (WOA) is integrated in it. The resultant Grey Wolf Whale Optimization Algorithm (GWWOA) offers better exploration ability and is able to solve the optimization problems to find the most optimal solution in search space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Remote sensing technologies for unlocking new groundwater insights: a comprehensive review by Ibrahim, Abba, Wayayok, Aimrun, Mohd Shafri, Helmi Zulhaidi, Toridi, Noorellimia Mat

    Published 2024
    “…This study examined recent advances in remote sensing (RS) techniques used for the quantitative monitoring of groundwater storage changes and assessed their current capabilities and limitations. The evolution of the techniques analyses spans from empirical reliance on sparse point data to the assimilation of multi-platform satellite measurements using sophisticated machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…Results show that the EFG algorithm produces results that are close in performance with the other ML methods while being highly interpretable, easily integrated into a more comprehensive grammar system and with lower model retraining adaptability time.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain by Mehdi , Hussain

    Published 2017
    “…In encryption, sensitive information transforms into meaningless data with observable existence, while steganography embeds the secret information inside an object (i.e. image, video, text, and audio) with invisible existence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix by Zhang, Chenglei, Li, Xiaoqian, Liu, Jiajia, Zhang, Yuanming, Zainudin, Edi Syams, Xu, Bo, Zhou, Sheng Fei, As’arry, Azizan Bin, Ismai, Mohd Idris Shah

    Published 2024
    “…In recent years, the realm of information technologies has undergone continual evolution, marked by significant progress in cloud computing, big data analytics, and the Internet of Things (IoT). …”
    Get full text
    Get full text
    Get full text
    Article