Search Results - (( knowledge visualization optimization algorithm ) OR ( java learning detection algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Normative Fish Swarm Algorithm For Global Optimization With Applications by Tan, Weng Hooi

    Published 2019
    “…Referred to as Normative Fish Swarm Algorithm (NFSA), the proposed Fish Swarm Algorithm, Optimized by Particle Swarm Optimization with Extended Memory (PSOEM-FSA) is expanded by amalgamating the normative knowledge to provide supplementary guidelines for better global optimum achievement and convergence rate. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking by Ong, Chor Keat

    Published 2017
    “…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
    Get full text
    Get full text
    Monograph
  6. 6

    A Review on energy consumption optimization techniques in IoT based smart building environments by Shah, Abdul Salam, Nasir, Haidawati, Fayaz, Muhammad, Lajis, Adidah, Shah, Asadullah

    Published 2019
    “…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms, and the introduction of new optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A review on energy consumption optimization techniques in IoT based smart building environment by Shah, Abdul Salam, Mohamad Nasir, Haidawati, Fayyaz, Muhammad, Lajis, Adidah, Shah, Asadullah

    Published 2019
    “…The gaps in the literature are due to advancements in technology, the drawbacks of optimization algorithms and the introduction of new optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Dynamic modelling of proton exchange membrane fuel cell system for electric bicycle / Azadeh Kheirandish by Azadeh, Kheirandish

    Published 2016
    “…Classical linear regression and artificial neural networks as the most popular and accurate algorithms have been optimized and used for modeling this system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. The proposed methodology involves collecting wafer inspection data, extracting relevant features, and applying the GSSL algorithm to identify the hidden defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Review on computational strategies for bi-layered metal powder compaction by Mohd Tahir, Suraya, Mohd Yusoff, Syamimi, Mohamed Ariff, Azmah Hanim, Supeni, Eris Elliandy, Anuar, Mohd Shamsul

    Published 2024
    “…A scrutinize part is the implementation of algorithm to describe powder behavior under double loading as well as to relate with other mechanical variables that eventually require expertise on computational plasticity knowledges involving horizontal contacts. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    Development of a Neural-Fuzzy Model for Machinability Data Selection in Turning Process by Kong, Hong Shim

    Published 2008
    “…The developed neural-fuzzy model should be further considered in a wider range of real-world machining processes for learning and prescribing knowledge.…”
    Get full text
    Get full text
    Thesis