Search Results - (( java implementation using algorithm ) OR ( pattern optimization learning algorithms ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Medical Image Analysis Using Deep Learning and Distribution Pattern Matching Algorithm by Jaber M.M., Yussof S., Elameer A.S., Weng L.Y., Abd S.K., Nayyar A.

    Published 2023
    “…Automation; Complex networks; Computational complexity; Deep learning; Image analysis; Medical imaging; Pattern matching; Pixels; Distribution pattern-matching rule; Distribution patterns; Gray wolf-optimized deep convolution network; Gray wolves; Learning patterns; Matching rules; Medical fields; Medical image analysis; Pattern matching algorithms; Pattern-matching; Convolution…”
    Article
  4. 4

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  9. 9

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  11. 11

    Meta-heuristics and deep learning for energy applications: Review and open research challenges (2018?2023) by Hosseini E., Al-Ghaili A.M., Kadir D.H., Gunasekaran S.S., Ahmed A.N., Jamil N., Deveci M., Razali R.A.

    Published 2025
    “…While deep learning excels in capturing intricate patterns in data, it may falter in achieving optimality due to the nonlinear nature of energy data. …”
    Review
  12. 12

    Predicting building damage grade by earthquake: a Bayesian Optimization-based comparative study of machine learning algorithms by Al-Rawashdeh, Mohammad, Al Nawaiseh, Moh’d, Yousef, Isam, Bisharah, Majdi, Alkhadrawi, Sajeda, Al-Bdour, Hamza

    Published 2024
    “…The class imbalance makes estimating building damage grades difficult, emphasizing the necessity for careful modeling. Bayesian Optimization optimizes machine learning algorithm hyperparameters to solve this problem. …”
    Get full text
    Get full text
    Article
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Constrained–Optimization-based Bayesian posterior probability extreme learning machine for pattern classification by Wong S.Y., Yap K.S.

    Published 2023
    “…Using random computational hidden neurons, ELM shows faster learning speed over the traditional learning algorithms. …”
    Conference Paper
  16. 16

    New bio-inspired barnacle optimizers based least-square support vector machine for time-series prediction of pandemic outbreaks by Marzia, Ahmed

    Published 2024
    “…Firstly, this thesis proposes hybrid optimized machine learning models by combining improved BMO variants with Least Squares Support Vector Machines (LSSVM) to effectively capture intricate temporal patterns. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A New Probabilistic Output Constrained Optimization Extreme Learning Machine by Wong S.Y., Yap K.S., Li X.C.

    Published 2023
    “…Benchmarking; Classification (of information); Constrained optimization; Decision making; Electric power systems; Iterative methods; Knowledge acquisition; Learning algorithms; Pattern recognition; Probability; Confidence threshold; Decision making process; Extreme learning machine; Machine learning approaches; Pattern classification problems; Post-processing procedure; Power system applications; Probabilistic output; Machine learning…”
    Article
  19. 19

    Probabilistic ensemble fuzzy ARTMAP optimization using hierarchical parallel genetic algorithms by Loo, C.K., Liew, W.S., Seera, M., Lim, Einly

    Published 2015
    “…To further augment the ARTMAP's pattern classification ability, multiple ARTMAPs were optimized via genetic algorithm and assembled into a classifier ensemble. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item