Search Results - (( model validation learning algorithm ) OR ( based construction based algorithm ))*

Refine Results
  1. 1

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm by Anuar, Wadi Khalid, Lee, Lai Soon, Seow, Hsin Vonn, Pickl, Stefan

    Published 2021
    “…The results obtained from the resulting rollout policy with CPLEX execution during rollout are also presented to validate the reduced model and the matheuristic algorithm. …”
    Get full text
    Get full text
    Article
  3. 3

    A robust firefly algorithm with backpropagation neural networks for solving hydrogeneration prediction by Hammid, Ali Thaeer, M. H., Sulaiman, Awad, Omar I.

    Published 2018
    “…The objective of this study, first, a firefly algorithm (FA) based on the k-fold cross-validation of BPNN has been suggested to predict data for keeping rapid learning and prevents the exponential increase in operating parts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat by Chia , Yu Huat

    Published 2024
    “…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…The transformed data is then modelled using machine learning algorithms such as Naïve Bayes classifier and Support Vector Machine to predict the overall sentiment of tweets, in which the finding depicted an overall positive sentiment surrounding the issue. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9

    Time series modeling of water level at Sulaiman Station, Klang River, Malaysia by Galavi, Hadi

    Published 2010
    “…The estimation of parameters of the model is accomplished using the hybrid learning algorithm consisting of standard neural network backpropagation algorithm and least squares method. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A deep learning Lora-based indoor localization technique by Aqqad, Kamilia, Aqqad, Karmel, Khdeir, Naeema, Zabade, Raha, Ghanem, Wasel, Lwas, Ali Kadhim, Al-Rimawi, Ashraf, Habaebi, Mohamed Hadi, Zyoud, Alhareth Mohammed

    Published 2026
    “…The collected dataset is used to train the deep learning model. To increase accuracy, techniques like data augmentation and cross-validation were included. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…However, when risk degrees were closely matched, the integrated model with weight adjustments based on base models outperformed ANN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Power allocation with non-orthogonal multiple access for 5G heterogeneous network by Johari, Muhammad Amirul Aiman, Anwar Apandi, Nur Ilyana, Muhammad, Nor Aishah

    Published 2023
    “…An algorithm is constructed based on the deep learning coordinated multi-point to simulate the performance of the downlink 5G. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Polytechnic science lecturers’ intention to use ICT as a tool in northeast Nigeria: a smart PLS approach by Yohanna, G., Md Yunos, Jailani, Mohamad, Marlina, Ruth, J. Y.

    Published 2017
    “…The Bootstrapping Algorithm with SmartPLS was applied for modelling interaction with 269 subjects from the targeted populations of 715 science lecturers from Northeast Nigeria. …”
    Get full text
    Get full text
    Article
  17. 17

    Artificial intelligence-driven anticancer peptide discovery by Wu, Junrui, Ji, Shuaiqi, Sahibzada, Kashif Iqbal, Lou, Mengxue, An, Feiyu, Li, Wenqian, Guo, Jiawei, Zhang, Taowei, Zhang, Xinyi, Chou, Yilin, Zhang, Henan, Jin, Hao, Ma, Teng, Liu, Weichi, Alikulov, Begali, Golovneva, Natalia Alekseevna, Foo, Hooi Ling, Kuralay, Issayeva, Sun, Zhihong, Wei, Dongqing, Wu, Rina

    Published 2025
    “…Therefore, we presented a comprehensive ACP screening framework based on AI models. The presented framework includes data collection and organization, feature extraction, model construction, model interpretability analysis, and experimental validation. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Multi depot dynamic vehicle routing problem with stochastic road capacity for emergency medical supply delivery in humanitarian logistics by Anuar, Wadi Khalid

    Published 2022
    “…The model proposed is based on Markov Decision Processes (MDP) modelling framework as part of reinforcement learning (RL) solution approach. …”
    Get full text
    Get full text
    Thesis
  20. 20