Search Results - (( rules active learning algorithm ) OR ( java adaptation optimization algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2

    A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules by Rizauddin, Saian

    Published 2013
    “…In the first proposed algorithm, SA is used to optimize the rule's discovery activity by an ant. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    An ELM-based single input rule module and its application in power generation by Yaw C.T., Wong S.Y., Yap K.S.

    Published 2023
    “…Extreme Learning Machine (ELM) is widely known as an effective learning algorithm than the conventional learning methods from the point of learning speed as well as generalization. …”
    Article
  4. 4

    Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance by Allawi, Mohammed Falah, Jaafar, Othman, Mohamad Hamzah, Firdaus, Koting, Suhana, Mohd, Nuruol Syuhadaa, El-Shafie, Ahmed

    Published 2019
    “…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
    Get full text
    Get full text
    Article
  5. 5

    An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.] by Rastogi, Sarthak, Shrotriya, Archit, Singh, Mitul Kumar, Potukuchi, Raghu Vamsi

    Published 2022
    “…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Suspicious activities detection for anti-money laundering using machine learning techniques by Lim, Aun Chir

    Published 2025
    “…This enables machine learning model to detect those suspicious activities more accurately than traditional approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A modified artificial neural network (ANN) algorithm to control shunt active power filter (SAPF) for current harmonics reduction by Sabo, Aliyu, Abdul Wahab, Noor Izzri, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah

    Published 2013
    “…The proposed AI adopted is an artificial neural network (ANN) responsible to detect current harmonics for the active power filtering process. The novelty control design is an artificial neural network (ANN) adopting a modified mathematical algorithm (a modified delta rule weight-updating W-H) and a suitable alpha value (learning rate value) which determines the filters optimal operation. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Unified neural network controller of series active power filter for power quality problems mitigation by Ghazanfarpour, Behzad

    Published 2013
    “…First, Widrow-Hoff algorithm is examined and its constant learning rate is modified by adding an adaptive learning rule to change the learning rate value. …”
    Get full text
    Get full text
    Thesis
  9. 9

    E-Handrawn Calculator by Mohamad, Syamimi

    Published 2008
    “…Back-propagation network is a supervised learning method, and is an implementation of the Delta rule. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    PROPOSED METHODOLOGY FOR OPTIMIZING THE TRAINING PARAMETERS OF A MULTILAYER FEED-FORWARD ARTIFICIAL NEURAL NETWORKS USING A GENETIC ALGORITHM by ABDALLA, OSMAN AHMED

    Published 2011
    “…Particularly, GA is utilized to determine the optimal number of hidden layers, number of neurons in each hidden layer, type of training algorithm, type of activation function of hidden and output neurons, initial weight, learning rate, momentum term, and epoch size of a multilayer feed-forward ANN. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive unified neural network for dynamic power quality compensation by Ghazanfarpour, Behzad, Mohd Radzi, Mohd Amran, Mariun, Norman, Shoorangiz, Reza

    Published 2013
    “…Moreover, an adaptive learning rule is applied on the neural network algorithm to enhance the system speed in detecting voltage sag magnitude and phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the rule-based approach. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…A number of researchers keep on proposing various alternative framework consisting detection methods day by days in combating activities such as single classification and rule based approach. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  16. 16
  17. 17

    Knowledge of extraction from trained neural network by using decision tree by Soleh, Ardiansyah, Mazlina, Abdul Majid, Jasni, Mohamad Zain

    Published 2017
    “…Further, the Levenberg Marquardt algorithm was applied to training 30 networks for each datasets, using learning parameters and basis weights differences. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Modeling Teacher's Integrity Using Data Mining by Mohd Latifi, Abdul Ghani

    Published 2010
    “…With high integrity characteristic, the teachers will enable to manage class excellently, encourage students in teaching and learning activities and able to complete task given by administrator on time. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
    Get full text
    Get full text
    Get full text
    Article