Search Results - (( using function based algorithm ) OR ( software identification learning algorithm ))

Refine Results
  1. 1

    Texture-based classification of workpiece surface images using the support vector machine by Ashour, Mohammed Waleed, Abdul Halin, Alfian, Khalid, Fatimah, Abdullah, Lili Nurliyana, Darwish, Samy H.

    Published 2015
    “…Machine vision can be used to semi- or fully automate this identification process by firstly extracting features from captured workpiece images, followed by analysis using machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The proposed algorithm is able to improve the weaknesses in PQF model in updating and learning the important attributes for software quality assessment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman by Abdul Rahman, Muhammad Faiz Hazim

    Published 2022
    “…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Bacteria identification via Artificial Neural Network based-on Bergey’s manual by Ruhaimi, Amirul Hafiiz

    Published 2017
    “…Levenberg Marquardt algorithm based Feed-forward backpropagation with Multilayer perceptron type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results within short period of time.…”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Application of artificial neural network in bacteria identification based on Bergey’s manual: Hydrogenophilaceae family: article by Ruhaimi, Amirul Hafiiz, Ahmad, Normadyzah, Husin, Hazlina, Mohamad Pauzi, Syazana

    Published 2017
    “…Levenberg Marquardt algorithm based Feedforward backpropagation with Multilayer perceptrons type of ANN was used in the training and learning sessions of the ANN development in order to obtain high accuracy simulation results. within short period time.…”
    Get full text
    Get full text
    Article
  18. 18

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
    Get full text
    Get full text
    Article