Search Results - (( java implementation model algorithm ) OR ( pattern machine learning algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Machine learning predictions of stock market pattern using Econophysics approach by Roslan, Nur Nadia Hani, Abdullah, Shahino Mah

    Published 2025
    “…Hence, this research will be using Monte Carlo Simulation and identify which machine learning algorithm is suitable for predicting stock market patterns. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Financial time series predicting using machine learning algorithms by Tiong, Leslie Ching Ow *

    Published 2013
    “…Thereafter, Artificial Neural Network (ANN) and Support Vector Machine (SVM) algorithms are implemented separately to train with the trend patterns for predicting the movement direction of financial trends. …”
    Get full text
    Thesis
  5. 5

    A Truly Online Learning Algorithm using Hybrid Fuzzy ARTMAP and Online Extreme Learning Machine for Pattern Classification by Wong S.Y., Yap K.S., Yap H.J., Tan S.C.

    Published 2023
    “…Algorithms; Benchmarking; E-learning; Knowledge acquisition; Learning systems; Pattern recognition; Bench-mark problems; Efficient learning; Extreme learning machine; Fuzzy ARTMAP; Generalization performance; Online learning; Online learning algorithms; Online sequential extreme learning machine; Learning algorithms…”
    Article
  6. 6
  7. 7

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. …”
    Get full text
    Get full text
    Article
  8. 8

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…The Random Decision Forest and the Support Vector Machine are the machine learning algorithms employed for this task. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13
  14. 14
  15. 15

    A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications by Usmani, U.A., Happonen, A., Watada, J.

    Published 2022
    “…Unsupervised learning, also known as unsupervised machine learning, analyzes and clusters unlabeled data utlizing machine learning techniques. …”
    Get full text
    Get full text
    Article
  16. 16

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
    Get full text
    Get full text
    Article
  17. 17

    A New Probabilistic Output Constrained Optimization Extreme Learning Machine by Wong S.Y., Yap K.S., Li X.C.

    Published 2023
    “…Benchmarking; Classification (of information); Constrained optimization; Decision making; Electric power systems; Iterative methods; Knowledge acquisition; Learning algorithms; Pattern recognition; Probability; Confidence threshold; Decision making process; Extreme learning machine; Machine learning approaches; Pattern classification problems; Post-processing procedure; Power system applications; Probabilistic output; Machine learning…”
    Article
  18. 18

    Comparative study of machine learning algorithms in data classification by Tan, Kai Jun

    Published 2025
    “…This research conducts a comparative study of various machine learning algorithms for dataset classification to identify the most accurate and reliable classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Identifying diseases and diagnosis using machine learning by Iswanto I., Laxmi Lydia E., Shankar K., Nguyen P.T., Hashim W., Maseleno A.

    Published 2023
    “…Multi-dimensional and high dimensional are used in machine learning. By using machine learning automatic and classy algorithms can build. � BEIESP.…”
    Article
  20. 20

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis