Search Results - (( learning implementation gap algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1

    An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis by Tie, K. H., A., Senawi, Chuan, Z. L.

    Published 2022
    “…Linear discriminant analysis (LDA) is a very popular method for dimensionality reduction in machine learning. Yet, the LDA cannot be implemented directly on unsupervised data as it requires the presence of class labels to train the algorithm. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  2. 2

    Implementing server-side federated learning in an edge-cloud framework for precision aquaculture by Ng, Bryan Jing Hong

    Published 2025
    “…After identifying the gaps in current systems, this project proposes a secure and scalable server-side federated learning framework in an edge-cloud architecture for precision aquaculture. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  5. 5

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    Advances in metaheuristics: Applications in engineering systems by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…This book helps fill the existing gap in literature on the implementation of metaheuristics in engineering applications and real-world engineering systems. …”
    Get full text
    Get full text
    Book
  7. 7

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Analytical framework for predicting online purchasing behavior in Malaysia using a machine learning approach by Mustakim, Nurul Ain

    Published 2025
    “…Validation included both machine learning evaluation and expert feedback. Machine learning results showed strong performance, with Random Tree and PART delivering the most reliable predictions. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The hyperparameter optimization achieved best performance by implementing the EHS algorithm at the system level, thereby increasing feature-detection accuracy and bridging the gap between deep learning innovation and real-world malware detection and response models. …”
    thesis::doctoral thesis
  10. 10

    Smart Glove for Sign Language Translation by Ahmad Imran, Mohd Thaim, Norazlianie, Sazali, Kadirgama, Kumaran, Ahmad Shahir, Jamaludin, Faiz, Mohd Turan, Norhaida, Ab. Razak

    Published 2023
    “…Key objectives include designing a lightweight and ergonomic glove prototype, developing machine learning algorithms for sign language recognition, implementing real-time translation capabilities, evaluating the glove's accuracy and usability, and assessing the potential impact on facilitating communication for deaf people. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  13. 13

    Decision Support Tools: Machine Learning Application in Smart Planner by Baharom, M.A.A., Rahman, M.S.A., Sabudin, A.R., Nor, M.F.M.

    Published 2023
    “…Immaculate Project Planning and Execution (PPE) is capital to edge over competitors, decrease costs and honour delivery dates.Project Management Information System (PMIS) is necessary towards an improved and efficient quality of any project.Machine Learning (ML) Algorithms enabled learned the date of experience to develop insights into various associations between data and outcomes.A defined set of rules prescribed by the analysts makes the probability of the fault possible.In this paper, Regression Model compute across all viable sectors expending the tool for Downstream Business and other Facilities Upstream, including Resource Estimation Schedule Generation.Extending structured information into a reliable database allows super users to define the data structures and completely configurable the settingâ��s dynamics.The model used to decrease the approximation error and measure the closest possible outcome.This subset of artificial intelligence has tremendous potential in improving schedule generation configuration to develop Project Planning timely and financially smartly.This paper aims to share standard protocols and methods applied in ML-aided as a tool in PPE decision making.Additionally, the abundant used data resources devoted to implementing ML are outlined.Finally, ML success as a Decision Support tool in project management by having a Smart Planner in supporting project recommendation accelerates the decision process, increases stakeholder confidence, and minimizes uncertainty; results are reviewed and analyzed where gaps and potential improvement for future projects are being noted and highlighted. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Software module clustering: An in-depth literature analysis by Qusay I., Sarhan, Ahmed, Bestoun S., Bures, Miroslav, Kamal Z., Zamli

    Published 2022
    “…The obtained data were then used to answer several research questions regarding state-of-the-art clustering approaches, applications of clustering in software engineering, clustering processes, clustering algorithms, and evaluation methods. Several research gaps and challenges in software module clustering are discussed in this paper to provide a useful reference for researchers in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Sentiment-analysis to detect early depressive symptom in Bangla language from social media: a review study by Hassan, Md. Hasibul, Kamaruddin, Azrina, Azmi Murad, Masrah Azrifah

    Published 2021
    “…The review shows that the mostly used method in Sentiment-analysis is Machine Learning in the field of Opinion-mining. Furthermore, we have identified another variable that can be included to improve the existing algorithm.…”
    Get full text
    Get full text
    Article
  18. 18

    Testing the minimal bounded space method on vision-based drone navigation / Yap Seng Kuang by Yap , Seng Kuang

    Published 2021
    “…Recently, the availability of the deep learning algorithm also encourages the object-based approach for drone navigation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Toward Predicting Student�s Academic Performance Using Artificial Neural Networks (ANNs) by Baashar Y., Alkawsi G., Mustafa A., Alkahtani A.A., Alsariera Y.A., Ali A.Q., Hashim W., Tiong S.K.

    Published 2023
    “…Given the existing literature, machine learning (ML) approaches such as Artificial Neural Networks (ANNs) can continuously be improved. …”
    Article
  20. 20