Search Results - (( pattern generation learning algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…In the first and second phases, a threshold fuzzy c-means clustering algorithm as a clusterer and a pattern ensemble learning method based on the incremental genetic-based algorithms are proposed respectively. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Machine learning predictions of stock market pattern using Econophysics approach by Roslan, Nur Nadia Hani, Abdullah, Shahino Mah

    Published 2025
    “…Hence, this research will be using Monte Carlo Simulation and identify which machine learning algorithm is suitable for predicting stock market patterns. …”
    Get full text
    Get full text
    Book Section
  8. 8

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Exploratory study of Kohonen network for human health state classification by Mohd Rahman, Hamijah, Arbaiy, Nureize, Che Lah, Muhammad Shukeri, Hassan, Norlida Hassan

    Published 2018
    “…Neural Connection tool is used to generate the result based on Kohonen learning algorithm. …”
    Get full text
    Get full text
    Article
  19. 19

    Herbs recognition based on chemical properties using machine learning algorithm by Mohamad Radzi, Nur Fadzilah, Che Soh, Azura, Ishak, Asnor Juraiza, Hassan, Mohd Khair

    Published 2023
    “…This method has demonstrated promising results in identifying herb species, and the classification method based on machine learning algorithms has proven successful in recognizing and distinguishing herb species…”
    Get full text
    Get full text
    Article
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item