Search Results - (( evolution machine learning algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improved whale optimization algorithm for feature selection in Arabic sentiment analysis by Tubishat, Mohammad, Abushariah, Mohammad A.M., Idris, Norisma, Aljarah, Ibrahim

    Published 2019
    “…In SA, feature selection phase is an important phase for machine learning classifiers specifically when the datasets used in training is huge. …”
    Get full text
    Get full text
    Article
  9. 9

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Machine learning modeling for radiofrequency electromagnetic fields (RF-EMF) signals from mmWave 5G signals by Al-Jumaily, Abdulmajeed, Sali, Aduwati, Riyadh, Mohammed, Wali, Sangin Qahtan, Li, Lu, Osman, Anwar Faizd

    Published 2023
    “…Each model contains three machine learning techniques to forecast RF-EMF values: Approximate-RBFNN, Exact-RBFNN, and GRNN. …”
    Get full text
    Get full text
    Article
  11. 11

    Modeling 2D appearance evolution for 3D object categorization by Mohd Zaki, Hasan Firdaus, Shafait, Faisal, Mian, Ajmal

    Published 2016
    “…We pose the problem of categorizing 3D polygon meshes as learning appearance evolution from multi-view 2D images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  13. 13

    Ultra-short-term PV power forecasting based on a support vector machine with improved dragonfly algorithm by Kishore, D. J. Krishna, Mohamed, M. R., Sudhakar, K., Jewaliddin, S. K., Peddakapu, K., Srinivasarao, P.

    Published 2021
    “…Previously, Theexecution can be done by dragonfly algorithm (DA) through adaptive learning factor along with the differential evolution technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…In comparison with V-Detectors, cuckoo search, differential evolution, support vector machine, artificial neural network, na¨ıve bayes, and k-NN, experimental results demonstrates that CSDE-V-Detectors outperforms other algorithms with an average detection rate of 95:30% on all the datasets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Time series predictive analysis based on hybridization of meta-heuristic algorithms by Mustaffa, Zuriani, Sulaiman, Mohd Herwan, Rohidin, Dede, Ernawan, Ferda, Kasim, Shahreen

    Published 2018
    “…The identified meta-heuristic methods namely Moth-flame Optimization (MFO), Cuckoo Search algorithm (CSA), Artificial Bee Colony (ABC), Firefly Algorithm (FA) and Differential Evolution (DE) are individually hybridized with a well-known machine learning technique namely Least Squares Support Vector Machines (LS-SVM). …”
    Get full text
    Get full text
    Article
  17. 17

    Evolution, design, and future trajectories on bipedal wheel-legged robot: A comprehensive review by Zulkifli, Mansor, Irawan, Addie, Mohammad Fadhil, Abas

    Published 2023
    “…Emphasizing the need for adaptable, terrain-aware control algorithms, the review explores the untapped potential of machine learning and soft robotics in enhancing performance across diverse operational scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A New Co-Evolution Binary Particle Swarm Optimization With Multiple Inertia Weight Strategy For Feature Selection by Too, Jing Wei, Abdullah, Abdul Rahim, Mohd Saad, Norhashimah

    Published 2019
    “…The proposed method is validated with ten benchmark datasets from UCI machine learning repository. To examine the effectiveness of proposed method, four recent and popular feature selection methods namely BPSO, genetic algorithm (GA), binary gravitational search algorithm (BGSA) and competitive binary grey wolf optimizer (CBGWO) are used in a performance comparison. …”
    Get full text
    Get full text
    Get full text
    Article