Search Results - (( java implementation _ algorithm ) OR ( using deep ((using algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Stock price monitoring system by Ng, Chun Ming

    Published 2024
    “…The methodology used in this project is Cross-Industry Standard Process for Data Mining (CRISP-DM), which is a common standard for data mining projects. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Enhancement of text representation for Indonesian document summarization with deep sequential pattern mining by Dian Sa’adillah Maylawati

    Published 2023
    “…Therefore, the present study aims: (1) to improve Indonesian text summary by enhancing the Sequence of Word (SoW) as text representation using Sequential Pattern Mining (SPM) with PrefixSpan algorithm since the effectiveness of SPM in Indonesian is proven useful for text classification and clustering; (2) to combine SPM and Deep Learning (DeepSPM) in text summarization with Indonesian text, as a result of its superior accuracy when trained with large amounts of data; and (3) to evaluate the readability of Indonesian text summary with several evaluation scenarios. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Optimizing sentiment analysis of Indonesian texts: Enhancing deep learning models with genetic algorithm-based feature selection by Siti, Mujilahwati, Noor Zuraidin, Mohd Safar, Ku Muhammad Naim, Ku Khalif, Nasyitah, Ghazalli

    Published 2024
    “…This study examines the optimization of Indonesian text sentiment analysis through the integration of feature selection using a genetic algorithm (GA) with deep learning models. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evolution of AI enabled healthcare systems using textual data with a pretrained BERT deep learning model by Wang, Yi Jie, Choo, Wei Chong, Ng, Keng Yap, Bi, Ran, Wang, Peng Wei

    Published 2025
    “…This study, using advanced text mining and multiple deep learning algorithms, utilized the Web of Science for scientific papers (1587) and the Derwent innovations index for patents (1314) from 2018 to 2022 to study future trends of emerging AI in healthcare. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Review of Wheat Disease Classification and Severity Detection Models by Hongyan, Zang, Annie, Joseph, Shourong, Zhang, Rong, Liu, Wanzhen, Wang

    Published 2023
    “…To combat these diseases, researchers have been studying the use of advanced techniques such as deep plant disease learning and image processing methods for identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A hybrid interpretable deep structure based on adaptive neuro‑fuzzy inference system, decision tree, and K‑means for intrusion detection by Jia, Lu, Yin Chai, Wang, Chee Siong, Teh, Xinjin, Li, Liping, Zhao, Fengrui, Wei

    Published 2022
    “…The proposed algorithm was trained, validated, and tested on the NSL-KDD (National security lab–knowledge discovery and data mining) dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A hybrid serendipity social recommender model / Ahmad Subhi Zolkafly and Rahayu Ahmad by Zolkafly, Ahmad Subhi, Ahmad, Rahayu

    Published 2020
    “…In the next stage, the classification model is used to classify the data into subclasses by using a deep learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A Data Mining Approach to Enhancing Birth and Death Registration Processes by Erfan, Hasmin

    Published 2025
    “…This study explores the use of data mining techniques to enhance registration efficiency by analyzing birth and death records from Makassar city’s population and civil registration office. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Event Detection and Information Extraction Strategies from Text: A Preliminary Study Using GENIA Corpus by Abdullah, M.H.A., Aziz, N., Abdulkadir, S.J., Akhir, E.A.P., Talpur, N.

    Published 2023
    “…However, data that are present in an unstructured form such as text documents are difficult to be processed by conventional machine learning algorithms. Therefore, in this study, we attempted to perform information extraction from textual data using current and state-of-the-art models to understand their working mechanisms. …”
    Get full text
    Get full text
    Article
  13. 13

    Event Detection and Information Extraction Strategies from Text: A Preliminary Study Using GENIA Corpus by Abdullah, M.H.A., Aziz, N., Abdulkadir, S.J., Akhir, E.A.P., Talpur, N.

    Published 2023
    “…However, data that are present in an unstructured form such as text documents are difficult to be processed by conventional machine learning algorithms. Therefore, in this study, we attempted to perform information extraction from textual data using current and state-of-the-art models to understand their working mechanisms. …”
    Get full text
    Get full text
    Article
  14. 14

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multitasking deep neural network models for Arabic dialect sentiment analysis by Alali, Muath Mohammad Oqlah

    Published 2022
    “…So far, there has been no effort to handle the negation context in Arabic using a deep neural network. The existing approaches are based on traditional machine learning algorithms, such as support vector machine (SVM). …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Without human input, these algorithms discover patterns or groupings in the data. …”
    Get full text
    Get full text
    Article
  17. 17

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  20. 20

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis