Search Results - (( java implementation phase algorithm ) OR ( data operation learning algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat Algorithm (BA) was hybrid based Multi-Layer Feedforward Neural Network (MLFNN) for modeling the temperature operating of photovoltaic module. …”
    Get full text
    Get full text
    Article
  4. 4

    Hybrid bat algorithm hybrid-artificial neural network for modeling operating photovoltaic module temperature / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat Algorithm (BA) was hybrid based Multi-Layer Feedforward Neural Network (MLFNN) for modeling the temperature operating of photovoltaic module. …”
    Get full text
    Get full text
    Thesis
  5. 5

    One day ahead daily peak hour load forecasting by using invasive weed optimization learning algorithm based Artificial Neural Network by Rahim, Muhammad Fitri

    Published 2012
    “…Based on result obtained, it shows that IWO learning algorithm is capable to produce accurate prediction load demand. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Operating a reservoir system based on the shark machine learning algorithm by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Ehteram, Mohammad, Hossain, Md Shabbir, El-Shafie, Ahmed

    Published 2018
    “…Therefore, the development of a mathematical optimization model is crucial for selecting the optimal policies for the reservoir operation. In the current study, the shark machine learning algorithm (SMLA) is proposed to develop an optimal rule for operating the reservoir. …”
    Get full text
    Get full text
    Article
  10. 10

    Classification of fault and stray gassing in transformer by using duval pentagon and machine learning algorithms by Haw, Jia Yong, Mohd Yousof, Mohd Fairouz, Abd Rahman, Rahisham, Talib, Mohd Aizam, Azis, Norhafiz

    Published 2022
    “…Data resampling technique (SMOTETomek) is applied and shows further improvement on the accuracy of predictions by machine learning algorithms when deal with imbalance data. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Machine learning in botda fibre sensor for distributed temperature measurement by Nur Dalilla binti Nordin

    Published 2023
    “…An alternative method is proposed, utilizing machine learning algorithms. Therefore, this thesis explores the comparative analysis for BOTDA data processing using the six most suited machine learning algorithms. …”
    text::Thesis
  14. 14

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Applications of deep learning algorithms for supervisory control and data acquisition intrusion detection system by Balla, Asaad, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Mubarak, Sinil

    Published 2022
    “…In this paper, we have examined and presented the most recent research on developing robust IDSs using Deep Learning (DL) algorithms, including Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Stacked Autoencoders (SAE), and Deep Belief Networks (DBN). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Machine learning and deep learning approaches for cybersecurity: a review by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article