Search Results - (( java application using algorithm ) OR ( set generation learning algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Also, the proposed models for learning in data sets generated the classification rules faster than other methods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Comparative analysis of three approaches of antecedent part generation for an IT2 TSK FLS by Hassan, S., Khanesar, M.A., Jaafar, J., Khosravi, A.

    Published 2017
    “…Since extreme learning machine is a non-iterative estimation procedure, it is faster than gradient-based algorithms which are iterative. …”
    Get full text
    Get full text
    Article
  7. 7

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules by Rizauddin, Saian

    Published 2013
    “…Benchmark data sets from various fields were used to test the proposed algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A low dispersion probabilistic roadmaps (LD-PRM) algorithm for fast and efficient sampling-based motion planning by Khaksar W., Hong T.S., Khaksar M., Motlagh O.

    Published 2023
    “…In this paper, we propose a new learning strategy for a probabilistic roadmap (PRM) algorithm. …”
    Article
  10. 10

    The new efficient and accurate attribute-oriented clustering algorithms for categorical data by Qin, Hongwu

    Published 2012
    “…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new technique for improving the dispersion of a set of samples. Application in multi-query motion planning by Khaksar W., Hong T.S., Sahari K.S.B.M., Khaksar M.

    Published 2023
    “…For measuring the uniformity of the generated samples, a new algorithm was created to measure the dispersion of a set of samples based on any desired resolution. …”
    Conference Paper
  12. 12
  13. 13

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Short-Term forecasting of floating photovoltaic power generation using machine learning models by Mohd Herwan, Sulaiman, Mohd Shawal, Jadin, Zuriani, Mustaffa, Mohd Nurulakla, Mohd Azlan, Hamdan, Daniyal

    Published 2024
    “…The dataset was divided into a training set (first five days) and a testing set (remaining two days), and five machine learning models—Neural Networks (NN), Random Forest (RF), Extreme Learning Machine (ELM), Support Vector Regression (SVR), and Long Short-Term Memory (LSTM)—were employed. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…A simulated Khepera robot is evolved by a Pareto-frontier Differential Evolution (POE) algorithm, and learned through a 3-layer feed-forward artificial neural network, attempting to simultaneously fulfill two conflicting objectives of maximizing robot phototaxis behavior while minimizing the neural network's hidden neurons by generating a Pareto optimal set of controllers. …”
    Get full text
    Get full text
    Research Report
  17. 17
  18. 18

    Optimal parameters of an ELM-based interval type 2 fuzzy logic system: a hybrid learning algorithm by Hassan, S., Khanesar, M.A., Jaafar, J., Khosravi, A.

    Published 2018
    “…A disadvantage of ELM is the random generation of its hidden neuron that causes additional uncertainty, in both approximation and learning. …”
    Get full text
    Get full text
    Article
  19. 19

    MaxD K-Means: A clustering algorithm for auto-generation of centroids and distance of data points in clusters by Wan Maseri, Wan Mohd, Beg, Abul Hashem, Herawan, Tutut, Fazley Rabbi, Khandakar

    Published 2012
    “…In this paper, we propose a clustering technique called MaxD K-Means clustering algorithm. MaxD K-Means algorithm auto generates initial k (the desired number of cluster) without asking for input from the user. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An Apriori-based Data Analysis on Suspicious Network Event Recognition by Jian, Z., Sakai, H., Watada, J., Roy, A., Hassan, M.H.B.

    Published 2019
    “…Apriori-based rule generators, which are powered by the DIS-Apriori algorithm and the NIS-Apriori algorithm, are applied to analyze the data sets available in the IEEE BigData 2019 Cup: Suspicious Network Event Recognition. …”
    Get full text
    Get full text
    Conference or Workshop Item