Search Results - (( java implication based algorithm ) OR ( using file learning algorithm ))

Refine Results
  1. 1
  2. 2

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…These types of agents have different capabilities, actions, and efficiency to the irsync algorithm in file synchronization. The study proposed MAS framework in the Learning Management System (LMS) that involves the transfer of data from one machine to another. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses machine learning method to detect anomalies in system log files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
    Get full text
    Article
  5. 5
  6. 6

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    A review on security and privacy issues in E-learning and the MapReduce aproach by Noor Akma, Abu Bakar, Mazlina, Abdul Majid, Khalid, Adam, Kirahman, Ab Razak, Noorhuzaimi@Karimah, Mohd Noor

    Published 2019
    “…Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    PREDICTING THE PRICE OF COTTON USING RNN AND LSTM by MOHAMAD, AHMAD LUKMAN

    Published 2020
    “…This research is aimed to utilize the machine learning algorithm to try and predict the future price of cotton by using the historical price of cotton provided by investing.com. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Malware detection using machine learning / Nur Wahida Kausar Abd Rahman by Abd Rahman, Nur Wahida Kausar

    Published 2021
    “…To categorize malware families, the proposed DLMD approach uses both byte and ASM files for feature engineering. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment by Mwinyi, Amir Kombo, Syed Mohamed, Syed Abdul Rahman Al Haddad, Abdullah, Rusli, Hashim, Shaiful Jahari

    Published 2012
    “…The motivation of this study is based on the use of web based learning system from different institutions to embrace the concept of e-learning and m-learning. …”
    Get full text
    Get full text
    Conference or Workshop Item