Search Results - (( java implementation learning algorithm ) OR ( pattern detection connection algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI by Toh, Han Yaung

    Published 2019
    “…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
    Get full text
    Get full text
    Monograph
  3. 3

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…Firstly, to detect the source, a Source Detection Algorithm (SDA) known as a Distributed Lévy Flight (DLF) is proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…This study present segmentation of syllables in Malay connected digit speech. Segmentation was done in time domain signal using statistical approaches namely the Brandt’s Generalized Likelihood Ratio (GLR) algorithm and Divergence algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  11. 11

    Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection by Muhammad Arif, Mohamad, Muhammad Aliif, Ahmad, Zuriani, Mustaffa

    Published 2024
    “…Artificial Neural Network (ANN) is one popular method for website phishing detection. ANN is capable of detecting phishing websites by identifying patterns and characteristics connected to phishing websites through a network training phase. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Anomaly detection in network traffic using machine learning by Amir Muhammad Hafiz, Othman, Mohd Faizal, Ab Razak, Mohd Izham, Mohd Jaya, Nurul Azma, Abdullah, Alanda, Alde

    Published 2026
    “…Five (5) performance metrics, which are accuracy, precision, recall, and f-measure, are utilized to assess the result of each algorithm. The results highlight that the KNN algorithm achieves the highest accuracy, at 97%, while the ID3 algorithm produces a balanced trade-off between performance and efficiency. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…In the software development testing we examine image based clustering, as we can used clustering by distance base, by pixel (red, green, blue) value etc., The problem is solved by region based method which is based on connect component and background detection techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A Design Of License Plate Recognition System Using Convolutional Neural Network by Ahmad Radzi, Syafeeza, Piramli, Muhamad Marzuki, Wong, Yan Chiew, Abdul Hamid, Norihan, Ali, Nur Alisa, Mat Ibrahim, Masrullizam

    Published 2019
    “…This is achieved by validating the best parameters of the enhanced Stochastic Diagonal Levenberg Marquardt (SDLM) learning algorithm and network size of CNN. Several preprocessing algorithms such as Sobel operator edge detection, morphological operation and connected component analysis have been used to localize the license plate, isolate and segment the characters respectively before feeding the input to CNN. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Fuzzy Platform for Embedded Wearable EEG Seizure Detection in Ambulatory State by Shakir, Mohamed, Malik, Aamir Saeed, Kamel , Nidal, Qidwai, Uvais

    Published 2014
    “…This gives an enhanced advantage over the existing EEG based seizure detection systems due to their complex pattern classification methodologies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Rule-base wearable embedded platform for seizure detection from real EEG data in ambulatory state by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…This gives an enhanced advantage over the existing EEG based seizure detection systems due to their complex pattern classification methodologies. …”
    Get full text
    Get full text
    Conference or Workshop Item