Search Results - (( features generation learning algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3
  4. 4
  5. 5

    Wind power forecasting with metaheuristic-based feature selection and neural networks by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Mohd Mawardi, Saari, Mohammad Fadhil, Abas

    Published 2024
    “…Specifically, five distinct algorithms - Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Teaching-Learning-Based Optimization (TLBO), and Evolutionary Mating Algorithm (EMA) - are integrated with NN model to identify optimal feature subsets from a comprehensive dataset of 18 diverse features. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms by Masrom, S., Rahman, R.A., Mohamad, M., Rahman, A.S.A., Baharun, N.

    Published 2022
    “…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  7. 7

    Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms by Masrom, S., Rahman, R.A., Mohamad, M., Rahman, A.S.A., Baharun, N.

    Published 2022
    “…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  8. 8

    A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis by Chen, Li

    Published 2024
    “…This requires the generator to learn how to generate images from partially damaged data, leading to better representations learned from the data. …”
    Get full text
    Get full text
    Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Attacks detection in 6G wireless networks using machine learning by Saeed, Mamoon M., Saeed, Rashid A., Gaid, Abdulguddoos S. A., Mokhtar, Rania A., Khalifa, Othman Omran, Ahmed, Zeinab E.

    Published 2023
    “…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…Moreover, log files have a lot of irrelevant and redundant features that act as noise. Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Information fusion and data augmentation with deep features for a deep learning-based baby cry recognition / Zhang Ke by Zhang , Ke

    Published 2024
    “…Two deep learning models, i.e. VGG16 and VGG19 are used to extract the deep features. …”
    Get full text
    Get full text
    Get full text
    Thesis