Search Results - (( knowledge detection learning algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Detecting cyber-security attacks is still a challenging task. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  10. 10

    An algorithm for Elliott Waves pattern detection by Vantuch, T., Zelinka, I., Vasant, P.

    Published 2018
    “…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Twisted pair cable fault diagnosis via random forest machine learning by Ghazali, N. B., Seman, F. C., Isa, K., Ramli, K. N., Z. Abidin, Z., Mustam, S. M., Haek, Haek, Z. Abidin, A. N., Asrokin, A.

    Published 2022
    “…Currently, most of the telecommunication providers monitor the network performance degradation hence troubleshoot the present of the fault by using commercial test gear on-site, which may be resolved using data analytics and machine learning algorithm. This paper presents a fault diagnosis method for twisted pair cable fault detection based on knowledge-based and data-driven machine learning methods. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses machine learning method to detect anomalies in system log files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    On equivalence of FIS and ELM for interpretable rule-based knowledge representation by Wong S.Y., Yap K.S., Yap H.J., Tan S.C., Chang S.W.

    Published 2023
    “…Classification (of information); Computer aided diagnosis; Fault detection; Fuzzy systems; Knowledge acquisition; Knowledge representation; Learning systems; Matrix algebra; Membership functions; Pattern recognition; Extreme learning machine; Fault detection and diagnosis; Fuzzy if-then rules; Fuzzy inference systems; Fuzzy membership function; Initialization technique; Interpretable rules; Rule based; Fuzzy inference; algorithm; artificial intelligence; artificial neural network; benchmarking; classification; electric power plant; factual database; feedback system; fuzzy logic; machine learning; nerve cell; reproducibility; statistical model; Algorithms; Artificial Intelligence; Benchmarking; Classification; Databases, Factual; Feedback; Fuzzy Logic; Machine Learning; Models, Statistical; Neural Networks (Computer); Neurons; Power Plants; Reproducibility of Results…”
    Article
  19. 19

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…The challenging differences between the phishing attacks on email and Twitter are that Twitter disseminates vast information and is difficult to be detected unlike email. Many phishing detection methods, ranging from blacklists, heuristics and visual similarity to machine learning are used to detect phishing attacks for spam emails, machine learning approaches achieve the best phishing email detection results. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…Datasets of well-known SQL injection attack patterns and AI/ML models intended for cybersecurity anomaly detection are among the resources underexplored, these findings show the potential for boosting detection capabilities by deploying ML and AI-based security solutions, with some algorithms scoring up to an 80 percent success rate in identifying SQL injections. …”
    Get full text
    Get full text
    Get full text
    Article