Search Results - (( java implementation means algorithm ) OR ( basic detection learning algorithm ))
Search alternatives:
- implementation means »
- java implementation »
- detection learning »
- learning algorithm »
- means algorithm »
- basic detection »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
Get full text
Get full text
Conference or Workshop Item -
3
A hybrid particle swarm optimization - extreme learning machine approach for intrusion detection system
Published 2018“…Hybrid model's approaches have been widely used to increase the effectiveness of intrusion-detection platforms. This work proposes the extreme learning machine (ELM) is one of the poplar machine learning algorithms which, easy to implement with excellent learning performance characteristics. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
5
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
6
Investigate And Analysis Of Deep Learning And Machine Learning Algorithm For Face Mask Detection System
Published 2022Get full text
Get full text
Undergraduates Project Papers -
7
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
Get full text
Get full text
Thesis -
8
The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer
Published 2023“…Moreover, this paper also defined the basic requirements for creating a skin cancer detection application, which revolves around two main issues: the full segmentation image and the tracking of the lesion on the skin using deep learning. …”
Get full text
Get full text
Get full text
Article -
9
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
11
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…An approach that detects steady state value for calling genetic algorithm (GA) is proposed to overcome the problems of good classifiers deletion and the local minima trap. …”
Get full text
Get full text
Thesis -
12
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…This isolation is essentially a classification task, which led researchers to attempt the application of well-known classifiers from the area of machine learning to intrusion detection. Neural Networks (NNs) are one of the most popular techniques to perform non-linear classification, and have been extensively used in the literature to perform intrusion detection. …”
Get full text
Get full text
Thesis -
13
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Results of studying color segmentation using machine-learning algorithm and color space analysis is presented in this thesis. …”
Get full text
Get full text
Thesis -
14
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
15
Image clustering comparison of two color segmentation techniques
Published 2010“…This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Review of Wheat Disease Classification and Severity Detection Models
Published 2023“…This paper mainly aims to explain deep learning-based wheat diseases identification algorithm, and to discuss the benefits and drawbacks of present wheat disease detection approaches. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
Get full text
Get full text
Thesis -
18
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…Therefore, the most recently published research studies have suggested machine learning techniques as an alternative method to detect Android malware due to their ability to learn and use the existing information to detect the new Android malware apps. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis
