Search Results - (( java implementation learning algorithm ) OR ( rate detection function algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…The experimental results demonstrate that the proposed approach outperforms the existing techniques, with the detection rate of attack and false alarm rates of 95.7265 and 4.2735, respectively. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Adaptive glioblastoma detection using evolutionary-based algorithm / Nurul Amira Mohd Ali by Mohd Ali, Nurul Amira

    Published 2020
    “…The objectives of the project are to design and develop a prototype of adaptive Glioblastoma detection using Evolutionary-based algorithm to assist in detecting brain tumor and also to test the prototype’s functionality and detection accuracy. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Development of an efficient algorithm for fetal heart rate detection: a hardware approach by Ibrahimy, Muhammad Ibn, Reaz, Mamun Bin Ibne, Mohd Ali, Mohd Alauddin, T., H. Khoon, Ismail, Ahmad Faris

    Published 2006
    “…Test case results showed an error percentage of around ±0.3% and ±0.5% for the detection of maternal and fetal heart rate respectively.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Smart fall detection by enhanced SVM with fuzzy logic membership function by Harum, Norharyati, Khalil, Mohamad Kchouri, Hazimeh, Hussein, Obeid, Ali

    Published 2023
    “…An overall accuracy of about 99.87% in detecting the fall function was obtained. Furthermore, the overall sensitivity of 100% with no false negative rate obtained was achieved by implementing the proposed method. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The adaptive algorithms are evaluated as a function of the number of iterations it takes to converge and its transmission performance are compared. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    An efficient anomaly intrusion detection method with evolutionary neural network by Sarvari, Samira

    Published 2020
    “…The experiment results show that not only accuracy also detection rate and false alarm rate have had an exhibitive improve. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim by Mohamed Hatim, Shahirah

    Published 2016
    “…From the result and analysis obtained in this research, it is established that both TOS and RPS are comparable in terms of the detection rate, specificity, false positive rate, false negative rate and accuracy. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Face Detection Using Radial Basis Function Neural Networks with Fixed Spread Value by A Aziz, Khairul Azha, Abdullah, Shahrum Shah, Mohd Jahari @ Mohd Johari, Ahmad Nizam

    Published 2011
    “…The performance of the RBFNN face detection system will be based on the False Acceptance Rate (FAR) and the False Rejection Rate (FRR) criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Sliding Window for Radial Basis Function Neural Network Face Detection by Mohamood, Nadzrie, Hashim, Nik Mohd Zarifie, Aziz, Khairul Azha A

    Published 2014
    “…The performance of the system will be based on the rate of detection and also false negative rate. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Early detection of anxiety in social media using Convolution neural network / Mohd Tharwan Hadi Ruslan by Ruslan, Mohd Tharwan Hadi

    Published 2021
    “…From literature study, the CNN algorithm had been chosen for this project, since CNN algorithm proof to be the best algorithm for classifying anxiety patients. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Integrated face detection approach for far image application by Salka, Tanko Daniel

    Published 2016
    “…Therefore, the need of a robust and efficient face detection algorithm is required to tackle these problems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Anomaly detection in ICS datasets with machine learning algorithms by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Abdul Rahman, Farah Diyana, Tahir, Mohammad

    Published 2021
    “…Detection techniques with machine learning algorithms on public datasets, suitable for intrusion detection of cyber-attacks in SCADA systems, as the first line of defense, have been detailed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article