Search Results - (( java evaluation model algorithm ) OR ( variable detection learning algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Pure intelligent monitoring system for steam economizer trips by Basim Ismail F., Hamzah Abed K., Singh D., Shakir Nasif M.

    Published 2023
    “…Economizers; Failure (mechanical); Fault detection; Knowledge acquisition; Learning algorithms; Learning systems; Neural networks; Plant shutdowns; Steam; Thermoelectric power plants; Extreme learning machine; Fault detection and diagnosis systems; Intelligent modeling; Intelligent monitoring systems; Network methodologies; Operational conditions; Operational variables; Thermal power plants; Steam power plants…”
    Conference Paper
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  6. 6

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
    Get full text
    Get full text
    Article
  8. 8

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9
  10. 10

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Real-Valued Negative Selection Algorithm with Variable-Sized Detectors (V-Detectors) is an offspring of AIS and demonstrated its potentials in the field of anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Detection of Denial of Service Attacks against Domain Name System Using Neural Networks by Rastegari, Samaneh

    Published 2009
    “…In the current research for our machine learning engine, we aimed to find the optimum machine learning algorithm to be used as an IDS. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Application of machine learning algorithms to predict the thyroid disease risk: an experimental comparative study by Islam, Saima Sharleen, Haque, Md Samiul, Miah, M. Saef Ullah, Sarwar, Talha, Nugraha, Ramdhan

    Published 2022
    “…For this reason, this study compares eleven machine learning algorithms to determine which one produces the best accuracy for predicting thyroid risk accurately. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Automated detection and evaluation of ischemic stroke on ct brain imaging using machine learning techniques by Sharuddin, Nur Amirah Atikah

    Published 2025
    “…This study investigates the application of machine learning algorithms for the detection of ischemic stroke using CT brain images. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    A deep learning approach for facial detection in targeted billboard advertising / Lau Sian En by Lau , Sian En

    Published 2025
    “…This system utilises sophisticated deep learning algorithm using Convolutional Neural Network (CNN) to identify and examine human faces, enabling advertisers to customise their content according to demographic variables including age and gender. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Pure intelligent monitoring system for steam economizer trips by Basim Ismail, F., Hamzah Abed, K., Singh, D., Shakir Nasif, M.

    Published 2017
    “…It is shown that ANN can be implemented for monitoring any process faults in thermal power plants. Better speed of learning algorithms by using the Extreme Learning Machine has been approved as well. © The authors, published by EDP Sciences, 2017.…”
    Get full text
    Get full text
    Article