Search Results - (( java implication based algorithm ) OR ( filing values learning algorithm ))
Search alternatives:
- learning algorithm »
- implication based »
- java implication »
- filing values »
-
1
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…The selected neural network architecture is the Multilayer Perceptron (MLP) network, which is trained with three different types of learning algorithms, namely the Levenberg Marquardt (LM), Bayesian Regression (BR) and Gradient Descent (GDX). …”
Get full text
Get full text
Research Reports -
5
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…Integrating SSA and SVM machine learning algorithms improves decision-making processes, leading to better crop yield through early detection and timely nutrient management. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
8
Speech emotion recognition using spectrogram based neural structured learning
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
DCT domain Stegasvm-shifted LSB model for highly imperceptible and robust cover-image / Hanizan Shaker Hussain
Published 2014“…This can be seen when PSNR record high value, where it displays a good quality cover-image with 48.94dB while high quality robustness for secretmessage with NC value is about 1.0. …”
Get full text
Get full text
Thesis -
11
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…Next, the information loss due to k-anonymity is computed. The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Predictive analytics for the sentiment of malaysian place of interest using machine learning models
Published 2023“…Furthermore, this study also trains three machine learning algorithms to predict the sentiment of textual data. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
14
-
15
-
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…To process large-scale data sequences, it is important to choose a suitable learning algorithm that is capable to learn in real time. …”
Get full text
Get full text
Thesis
