Search Results - (( filing implementation learning algorithm ) OR ( java optimisation based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
    Get full text
    Get full text
    Article
  11. 11

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
    thesis::doctoral thesis
  12. 12

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim by Halim, Zulkifli

    Published 2023
    “…The global trend in the CCRA study shows that implementing machine learning and deep learning techniques is expanding rapidly. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…In the first phase, the ontology element and algorithm techniques should be selected. While in the second phase, the HTML files are uploaded for processing. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Chinese character recognition using neural network / Low Poh Tian by Low, Poh Tian

    Published 2003
    “…The training parameters of the network i.e. the learning rate and momentum has both fixed to 0.6. The extracted image data is then feed into the network, the weights of which are modified by error-backpropagation algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module by Mujber, Tariq Saad

    Published 2001
    “…The mobile robot section shows the fabrication of the mobile robot, construction of gripper arm and some video of the movement of the mobile robot system. The implementation of this multimedia-based learning for robot technology will help to enhance the learning abilities of the engineering students. …”
    Get full text
    Get full text
    Thesis