Search Results - (( java application testing algorithm ) OR ( sets generation learning algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Also, the proposed models for learning in data sets generated the classification rules faster than other methods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Comparative analysis of three approaches of antecedent part generation for an IT2 TSK FLS by Hassan, S., Khanesar, M.A., Jaafar, J., Khosravi, A.

    Published 2017
    “…Since extreme learning machine is a non-iterative estimation procedure, it is faster than gradient-based algorithms which are iterative. …”
    Get full text
    Get full text
    Article
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules by Rizauddin, Saian

    Published 2013
    “…Benchmark data sets from various fields were used to test the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A low dispersion probabilistic roadmaps (LD-PRM) algorithm for fast and efficient sampling-based motion planning by Khaksar W., Hong T.S., Khaksar M., Motlagh O.

    Published 2023
    “…In this paper, we propose a new learning strategy for a probabilistic roadmap (PRM) algorithm. …”
    Article
  9. 9

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new technique for improving the dispersion of a set of samples. Application in multi-query motion planning by Khaksar W., Hong T.S., Sahari K.S.B.M., Khaksar M.

    Published 2023
    “…For measuring the uniformity of the generated samples, a new algorithm was created to measure the dispersion of a set of samples based on any desired resolution. …”
    Conference Paper
  11. 11
  12. 12

    Short-Term forecasting of floating photovoltaic power generation using machine learning models by Mohd Herwan, Sulaiman, Mohd Shawal, Jadin, Zuriani, Mustaffa, Mohd Nurulakla, Mohd Azlan, Hamdan, Daniyal

    Published 2024
    “…The dataset was divided into a training set (first five days) and a testing set (remaining two days), and five machine learning models—Neural Networks (NN), Random Forest (RF), Extreme Learning Machine (ELM), Support Vector Regression (SVR), and Long Short-Term Memory (LSTM)—were employed. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…A simulated Khepera robot is evolved by a Pareto-frontier Differential Evolution (POE) algorithm, and learned through a 3-layer feed-forward artificial neural network, attempting to simultaneously fulfill two conflicting objectives of maximizing robot phototaxis behavior while minimizing the neural network's hidden neurons by generating a Pareto optimal set of controllers. …”
    Get full text
    Get full text
    Research Report
  14. 14
  15. 15

    Optimal parameters of an ELM-based interval type 2 fuzzy logic system: a hybrid learning algorithm by Hassan, S., Khanesar, M.A., Jaafar, J., Khosravi, A.

    Published 2018
    “…A disadvantage of ELM is the random generation of its hidden neuron that causes additional uncertainty, in both approximation and learning. …”
    Get full text
    Get full text
    Article
  16. 16

    MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters by Wan Maseri, Wan Mohd, Beg, Abul Hashem, Herawan, Tutut, Fazley Rabbi, Khandakar

    Published 2012
    “…In this paper, we propose a clustering technique called MaxD K-Means clustering algorithm. MaxD K-Means algorithm auto generates initial k (the desired number of cluster) without asking for input from the user. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An Apriori-based Data Analysis on Suspicious Network Event Recognition by Jian, Z., Sakai, H., Watada, J., Roy, A., Hassan, M.H.B.

    Published 2019
    “…Apriori-based rule generators, which are powered by the DIS-Apriori algorithm and the NIS-Apriori algorithm, are applied to analyze the data sets available in the IEEE BigData 2019 Cup: Suspicious Network Event Recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Automatic email classification system / Phang Siew Ting by Phang , Siew Ting

    Published 2003
    “…The algorithms learn to classify emails based on it textual contents, and subsequently assign individual emails into a predefined set of categories or bins in accordance with the preferences of a user. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Multi-step time series prediction using recurrent kernel online sequential extreme learning machine / Liu Zongying by Liu , Zongying

    Published 2019
    “…However, the problems with traditional offline and online learning algorithms in machine learning algorithms are usually faced with parameter dependency, concept drift handling problem, connectionless of neural net and unfixed reservoir. …”
    Get full text
    Get full text
    Get full text
    Thesis