Search Results - (( java implementation level algorithm ) OR ( using auto learning algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters by Wan Maseri, Wan Mohd, Beg, Abul Hashem, Herawan, Tutut, Fazley Rabbi, Khandakar

    Published 2012
    “…K-Means is one of the unsupervised learning and partitioning clustering algorithms. It is very popular and widely used for its simplicity and fastness. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A student learning style auto-detection model in a learning management system by Rashid, Amirah, Raja Ikram, Raja Rina, Thamilarasan, Yarshini, Salahuddin, Lizawati, Abd Yusof, Noor Fazilla, Rashid, Zakiah

    Published 2023
    “…Future studies include the use of machine learning algorithms such as decision trees to auto-detect student learning styles in learning management systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Improved Parameterless K-Means: Auto-Generation Centroids and Distance Data Point Clusters by Wan Maseri, Wan Mohd, Beg, Abul Hashem, Herawan, Tutut, Noraziah, Ahmad

    Published 2011
    “…K-means is an unsupervised learning and partitioning clustering algorithm. It is popular and widely used for its simplicity and fastness. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Glass break detection system using deep auto encoders with fuzzy rules induction algorithm by Nyein Naing, Wai Yan, Htike, Zaw Zaw

    Published 2019
    “…This paper proposes a new design of a glass break detection algorithm based on Fuzzy Deep Auto-encoder Neural Network. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    End of Project: RIGS16-350-0514 by Htike@Muhammad Yusof, Zaw Zaw

    Published 2017
    “…This project proposes a novel machine learning algorithm called deep auto encoder network for learning the glass break model in a semi-supervised manner from audio data and for accurate detection of glass break sounds using unordered fuzzy rule induction algorithm.…”
    Get full text
    Get full text
    Monograph
  10. 10

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
    Article
  11. 11
  12. 12

    Earthquake prediction model based on geomagnetic field data using automated machine learning by Yusof, Khairul Adib, Mashohor, Syamsiah, Abdullah, Mardina, Amiruddin, Mohd, Rahman, Abd, Abdul Hamid, Nurul Shazana, Qaedi, Kasyful, Matori, Khamirul Amin, Hayakawa, Masashi

    Published 2024
    “…Several features were extracted from them through wavelet scattering transform (WST). The features were used as the input to model optimization, of which the strategy for automatic algorithm selection and hyperparameter tuning was performed based on the asynchronous successive halving algorithm (ASHA). …”
    Get full text
    Get full text
    Article
  13. 13

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  15. 15

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Auto-encoder variants for solving handwritten digits classification problem by Aamir, Muhammad, Mohd Nawi, Nazri, Mahdin, Hairulnizam, Naseem, Rashid, Zulqarnain, Muhammad

    Published 2020
    “…First, we introduce the conventional AE model and its different variant for learning abstract features from data by using a contrastive divergence algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Auto raise hand in Microsoft teams (API/Extension) by Teh, Boon Hin

    Published 2023
    “…To be more specific, it is regarding facial expression recognition based on deep learning. Artificial Intelligence focuses on developing intelligences of machines, by developing algorithms, machines are able to learn from data and patterns, even perform tasks that require human intelligence, such as visual perception, speech recognition, and decision-making. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Multi-class classification automated machine learning for predicting earthquakes using global geomagnetic field data by Qaedi, Kasyful, Abdullah, Mardina, Yusof, Khairul Adib, Hayakawa, Masashi, Zulhamidi, Nur Fatin Irdina

    Published 2025
    “…Through statistical analysis, important features were extracted and a multi-class classification model using geomagnetic data was created. The extracted features were the input for AutoML, an automatic algorithm selection that was measured by Bayesian Optimization algorithm to select the best performance model. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item