Search Results - (( java application testing algorithm ) OR ( machine learning methods algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Iris data set has been taken from UCO machine learning to assist in testing phase. The validity of the result for this web tool will be determined by the average score of the silhouette method. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The experiment is conducted for the datasets that obtained by using machine learning method. The results are obtained, showing the performance of machine learning method on each dataset.…”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6

    A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting by Md Salleh N.S., Suliman A., Jorgensen B.N.

    Published 2023
    “…Forecasting; Investments; Machine learning; Development investment; Energy prediction; Evaluation metrics; Long term planning; Machine learning methods; Metric evaluation; Resource planning; Systematic literature review; Learning algorithms…”
    Conference Paper
  7. 7
  8. 8

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article
  9. 9

    Rao-SVM machine learning algorithm for intrusion detection system by Abd, Shamis N., Alsajri, Mohammad, Ibraheem, Hind Raad

    Published 2020
    “…This article presents the development of an improved intrusion detection method for binary classification. In the proposed IDS, Rao Optimization Algorithm, Support Vector Machine (SVM), Extreme Learning Machine (ELM), and Logistic Regression (LR) (feature selection and weighting) were combined with NTLBO algorithm with supervised ML techniques (for feature subset selection (FSS). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A case study of microarray breast cancer classification using machine learning algorithms with grid search cross validation by Mohd Ali, Nursabillilah, Besar, Rosli, Ab Aziz, Nor Azlina

    Published 2023
    “…The study involved three machine learning algorithms, random forest (RF), extra tree (ET), and support vector machine (SVM). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Performance comparison of feature selection methods for prediction in medical data by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah, Amir Hussin, Amir 'Aatieff

    Published 2023
    “…Thus, feature selection should be fully utilized and applied when building machine learning algorithm. This study analyzes filter, wrapper, and embedded feature selection methods for medical data with the predictive machine learn- ing algorithm, Random Forest and CatBoost. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Machine learning algorithms have widely been adopted recently to enhance the performance of IDSs. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms by Sirajun Noor, Noor Azmiya

    Published 2021
    “…The objective of this study is to perform DM classification using various machine learning algorithms using Weka as a tool. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Identifying diseases and diagnosis using machine learning by Iswanto I., Laxmi Lydia E., Shankar K., Nguyen P.T., Hashim W., Maseleno A.

    Published 2023
    “…Multi-dimensional and high dimensional are used in machine learning. By using machine learning automatic and classy algorithms can build. � BEIESP.…”
    Article
  17. 17

    Interpretation of machine learning model using medical record visual analytics by Mohd Khalid, Nur Hidayah, Ismail, Amelia Ritahani, Abdul Aziz, Normaziah

    Published 2021
    “…This paper analyzed several visual analytics ap- proach instantiated in machine learning algorithm for medical record analytics. …”
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Comparative performance of machine learning algorithms for cryptocurrency forecasting by Hitam, Nor Azizah, Ismail, Amelia Ritahani

    Published 2018
    “…Methods has been proposed to construct models including machine learning algorithms such as Neural Networks (NN), Support Vector Machines (SVM) and Deep Learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui by Yang , Dong Rui

    Published 2019
    “…Numerous researchers have tried different methods to enhance the algorithm to improve performance, some of these methods include Support Vector Machine (SVM), Decision Trees, Extreme Learning Machine (ELM), Kernel Extreme Learning Machine (KELM), and Deng’s Reduced Kernel Extreme Learning Machine (RKELM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project