Search Results - (( pattern learning prevention algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK by MOHAMED AHMED ELSHEIK, MUNA ELSADIG

    Published 2011
    “…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Multilevel learning in Kohonen SOM network for classification problems by Mohd. Yusof, Norfadzila

    Published 2006
    “…Self-organizing map (SOM) is a feed-forward neural network approach that uses an unsupervised learning algorithm has shown a particular ability for solving the problem of classification in pattern recognition. …”
    Get full text
    Get full text
    Thesis
  5. 5

    SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan by Mazlan, Muhammad Muhaimin Aiman

    Published 2018
    “…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
    Get full text
    Get full text
    Student Project
  6. 6

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Characterization of Multiple Omics Signatures in Relation to Dietary Pattern for in Silico Personalised Colon Cancer Risk Stratification: Study Protocol for a Case-control Study an... by Nur Mahirah, Amani Mohammad, Mohd Razif, Shahril, Suzana, Shahar, Nor Fadilah, Rajab, Raja Affendi, Raja Ali *, Zairul Azwan, Mohd Azman, Syarul Nataqain, Baharum, Abrar Noor, Akramin Kamarudin, Chung, Felicia Fei Lei *, Razinah, Sharif

    Published 2022
    “…Multiple endpoints will be analyzed, namely metabolomic signatures, epigenetic marks, inflammatory markers and relationship with dietary patterns will be established. Multiple machine learning models will then be used to develop personalised risk stratification algorithms. …”
    Get full text
    Get full text
    Article
  8. 8

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Zakwan, applies Opposition-Based Learning method to improve the exploration capabilities of SKF algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  12. 12

    Prediction of novel doping agent through the integration of chemical and biological data using in silico method by Mohd Rosman, Nurul Ain

    Published 2016
    “…The in silica method, also known as in silica target prediction, first analyse patterns of protein-ligand binding from chemical and biological data through the use of machine learning algorithm. …”
    Get full text
    Get full text
    Student Project
  13. 13

    A Comparative Analysis Using Machine Learning Approach for Thunderstorm Prediction in Southern Region of Peninsular Malaysia by Shirley, Rufus, Noor Azlinda, Ahmad, Zulkurnain, Abdul Malek, Noradlina, Abdullah

    Published 2023
    “…Then the dataset is trained and tested using five Machine Learning (ML) algorithms, including Decision Trees (DT), Adaptive Boosting (AdaBoost), Random Forest (RF), Extra Trees (ET), and Gradient Boosting (GB). …”
    Get full text
    Get full text
    Proceeding
  14. 14

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm by Alyaa Ghazi Mohammed, Mohd Zakree Ahmad Nazri

    Published 2025
    “…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Smart waste management system with IoT monitoring by Kalitazan, Sachein, Muniswaran, Suvarshan, Velan, Sheshan, Muniswaran, Suvathithan, Shah, Dhanesh

    Published 2023
    “…Through advanced data analytics and machine learning algorithms, the platform predicts waste accumulation patterns, optimizes collection routes, schedules pickups based on fill-level data, and detects any abnormal conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Diabetic retinopathy detection using fusion of textural and optimized convolutional neural network features / Uzair Ishtiaq by Uzair , Ishtiaq

    Published 2024
    “…Combining Local Binary Patterns (LBP) based texture features and deep learning features resulted in the creation of the fused features vector which was then optimized using Binary Dragonfly Algorithm (BDA) and Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Network intrusion detection and alert system by To, Jin Yi

    Published 2024
    “…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20