Search Results - (( java implementation a algorithm ) OR ( pattern optimization learning algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm by Jaber M.M., Yussof S., Elameer A.S., Weng L.Y., Abd S.K., Nayyar A.

    Published 2023
    “…Automation; Complex networks; Computational complexity; Deep learning; Image analysis; Medical imaging; Pattern matching; Pixels; Distribution pattern-matching rule; Distribution patterns; Gray wolf-optimized deep convolution network; Gray wolves; Learning patterns; Matching rules; Medical fields; Medical image analysis; Pattern matching algorithms; Pattern-matching; Convolution…”
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  9. 9

    Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018?2023) by Hosseini E., Al-Ghaili A.M., Kadir D.H., Gunasekaran S.S., Ahmed A.N., Jamil N., Deveci M., Razali R.A.

    Published 2025
    “…While deep learning excels in capturing intricate patterns in data, it may falter in achieving optimality due to the nonlinear nature of energy data. …”
    Review
  10. 10

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms by Al-Rawashdeh, Mohammad, Al Nawaiseh, Moh’d, Yousef, Isam, Bisharah, Majdi, Alkhadrawi, Sajeda, Al-Bdour, Hamza

    Published 2024
    “…The class imbalance makes estimating building damage grades difficult, emphasizing the necessity for careful modeling. Bayesian Optimization optimizes machine learning algorithm hyperparameters to solve this problem. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  14. 14

    Constrained–Optimization-based Bayesian posterior probability extreme learning machine for pattern classification by Wong S.Y., Yap K.S.

    Published 2023
    “…Using random computational hidden neurons, ELM shows faster learning speed over the traditional learning algorithms. …”
    Conference Paper
  15. 15

    New bio-inspired barnacle optimizers based least-square support vector machine for time-series prediction of pandemic outbreaks by Marzia, Ahmed

    Published 2024
    “…Firstly, this thesis proposes hybrid optimized machine learning models by combining improved BMO variants with Least Squares Support Vector Machines (LSSVM) to effectively capture intricate temporal patterns. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A New Probabilistic Output Constrained Optimization Extreme Learning Machine by Wong S.Y., Yap K.S., Li X.C.

    Published 2023
    “…Benchmarking; Classification (of information); Constrained optimization; Decision making; Electric power systems; Iterative methods; Knowledge acquisition; Learning algorithms; Pattern recognition; Probability; Confidence threshold; Decision making process; Extreme learning machine; Machine learning approaches; Pattern classification problems; Post-processing procedure; Power system applications; Probabilistic output; Machine learning…”
    Article
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms by Loo, C.K., Liew, W.S., Seera, M., Lim, Einly

    Published 2015
    “…To further augment the ARTMAP's pattern classification ability, multiple ARTMAPs were optimized via genetic algorithm and assembled into a classifier ensemble. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Optimize and deploy machine learning algorithms on embedded devices for manufacturing applications by Teoh, Ming Xue

    Published 2025
    “…This proposal discusses the techniques of optimizing and deploying machine learning algorithms on embedded devices for manufacturing applications; We investigate problems of printed circuit board (PCB) defects and artificial intelligence in embedded system. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis