Search Results - (( knowledge solution learning algorithm ) OR ( java applications customization algorithm ))
Search alternatives:
- applications customization »
- customization algorithm »
- knowledge solution »
- learning algorithm »
- solution learning »
- java applications »
-
1
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
Get full text
Get full text
Thesis -
2
-
3
Coalition of genetic algorithms and artificial neural network for isolated spoken Malay speech recognition / Noraini Seman
Published 2012“…However, due to the stochastic nature of this algorithm, the learning process can reach an optimal solution with much higher probability than many standard neural network techniques.…”
Get full text
Get full text
Book Section -
4
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…By using the proposed algorithm, the sparse coefficients are learned by exploiting the relationships among different multi-view features and leveraging the knowledge from multiple related tasks. …”
Get full text
Get full text
Get full text
Thesis -
5
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
6
-
7
Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability
Published 2024“…Additionally, a Hybrid Black Hole Algorithm was proposed in the retrieval phase to optimize the final neuron states. …”
Get full text
Get full text
Get full text
Article -
8
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar
Published 2012“…The learning process creates knowledge that guides a person to make the decisions. …”
Get full text
Get full text
Research Reports -
12
-
13
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
14
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…These old manuscripts are rich sources of knowledge and thus invaluable reference for learning the culture, traditions, and early history of Malaysia. …”
Get full text
Get full text
Thesis -
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
16
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
17
Towards a better feature subset selection approach
Published 2010“…The selection of the optimal features subset and the classification has become an important issue in the data mining field.We propose a feature selection scheme based on slicing technique which was originally proposed for programming languages.The proposed approach called Case Slicing Technique (CST).Slicing means that we are interested in automatically obtaining that portion 'features' of the case responsible for specific parts of the solution of the case at hand.We show that our goal should be to eliminate the number of features by removing irrelevant once.Choosing a subset of the features may increase accuracy and reduce complexity of the acquired knowledge.Our experimental results indicate that the performance of CST as a method of feature subset selection is better than the performance of the other approaches which are RELIEF with Base Learning Algorithm (C4.5), RELIEF with K-Nearest Neighbour (K-NN), RELIEF with Induction of Decision Tree Algorithm (ID3) and RELIEF with Naïve Bayes (NB), which are mostly used in the feature selection task.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
Get full text
Get full text
Get full text
Article -
19
Enhancing generality of meta-heuristic algorithms through adaptive selection and hybridization
Published 2018“…Many meta-heuristic algorithms have been developed to date (e.g. Simulated Annealing (SA), Particle Swarm Optimization (PSO), Teaching Learning based Optimization (TLBO), Grey Wolf Optimizer(GWO) to name a few). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Handbook of Machine Learning for Computational Optimization: Applications and Case Studies
Published 2021“…Individuals looking for machine learning-based knowledge will find interest in this handbook. …”
Get full text
Get full text
Book
