Search Results - (( patterns using algorithm ) OR ((( new learning algorithm ) OR ( e learning algorithm ))))*

Refine Results
  1. 1

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…GA assists in optimizing the search process and performs machine learning. Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
    Conference paper
  2. 2

    A Truly Online Learning Algorithm using Hybrid Fuzzy ARTMAP and Online Extreme Learning Machine for Pattern Classification by Wong S.Y., Yap K.S., Yap H.J., Tan S.C.

    Published 2023
    “…Algorithms; Benchmarking; E-learning; Knowledge acquisition; Learning systems; Pattern recognition; Bench-mark problems; Efficient learning; Extreme learning machine; Fuzzy ARTMAP; Generalization performance; Online learning; Online learning algorithms; Online sequential extreme learning machine; Learning algorithms…”
    Article
  3. 3

    Alternate methods for anomaly detection in high-energy physics via semi-supervised learning by Md. Ali, Mohd. Adli, Badrud’din, Nu’man, Abdullah, Hafidzul, Kemi, Faiz

    Published 2020
    “…In this paper, we introduce two new algorithms called EHRA and C-EHRA, which use machine learning regression and clustering to detect anomalies in samples. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Prediction of stroke disease using machine learning techniques / Syarifah Adilah Mohamed Yusoff ... [et al.] by Mohamed Yusoff, Syarifah Adilah, Warris, Saiful Nizam, Abu Bakar, Mohd Saifulnizam, Kadar, Rozita

    Published 2024
    “…This study has investigated five commonly used machine learning algorithm to be constructed as potential models for predicting stroke dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm by Mohamed, M. E, Samir, B. B., Azween, Abdullah

    Published 2010
    “…In this work, we integrate artificial immune algorithm with non-linear classification of pattern recognition and machine learning methods to solve the problem of intrusion detection in network systems. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  6. 6

    The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim by Hamzah, Irni Hamiza, Ibrahim, Mohammad Nizam, Mohd Kasim, Linda

    Published 2006
    “…The capability of powerful personal computers and affordable and high resolution sensors (i.e.: CCD cameras, microphones and scanners) have fostered the development of pattern recognition algorithms in new application domains (i.e.: fuzzy logic, neural network and genetic algorithm). …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Integrated Features by Administering the Support Vector Machine of Translational Initiations Sites in Alternative Polymorphic Context by Nanna Suryana, Herman, Burairah, Hussin

    Published 2012
    “…After learning, the discriminant functions are employed to decide whether a new sample is true or false. …”
    Get full text
    Get full text
    Article
  8. 8

    An efficient fuzzy C-least median clustering algorithm by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Nizamuddin, Mohammed Khaja, Aboosalih, K C

    Published 2021
    “…In this paper we are discussing our new procedure for clustering called Fuzzy C-least median of squares algorithm which is an improvement to Fuzzy C-means (FCM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…During the "revise" and "retain" steps of the CBR, Knuth-Morris-Pratt (KMP) pattern matching algorithm is applied. � 2008 IEEE.…”
    Conference paper
  10. 10

    Improved GART neural network model for pattern classification and rule extraction with application to power systems by Yap K.S., Lim C.P., Au M.T.

    Published 2023
    “…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
    Article
  11. 11

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…Among these algorithms, Fuzzy Min Max (FMM) neural network algorithm has been proven to be one of the premier neural networks for undertaking the pattern classification problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Classification of chest radiographs using novel anomalous saliency map and deep convolutional neural network by Md. Ali, Mohd. Adli, Abidin, Mohd Radhwan, Nik Muhamad Affendi, Nik Arsyad, Abdullah, Hafidzul, Rosman, Daaniyal Reesha, Badrud'din, Nu'man, Kemi, Faiz, Hayati, Farid

    Published 2021
    “…Therefore, we also introduce the Xenafas algorithm in this paper. The algorithm creates a new kind of anomalous saliency map called the Intensity Probability Mapping and Weighted Intensity Probability Mapping. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The enhanced BPNN-NAR and BPNN-NARMA models for Malaysian aggregate cost indices with outlying data by Ahmad Kamaruddin, Saadi, Md Ghani, Nor Azura, Mohamed Ramli, Norazan

    Published 2015
    “…In theory, the most common training algorithm for Backpropagation algorithms leans on reducing ordinary least squares estimator (OLS) or more specifically, the mean squared error (MSE). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    E4ML: Educational Tool for Machine Learning by Sainin, Mohd Shamrie, Siraj, Fadzilah

    Published 2003
    “…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  18. 18

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…The proposed security architecture is constructed as an adaptive way-forward Internet-of-Things (IoT) friendly security solution that is comprised of three cyclic parts: learn, predict and prevent. A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan by Jamel, Shafie, Sayan, Giuseppina Sherry

    Published 2009
    “…Cryptanalysis steps can be easily explained using algorithm animation that can be easily integrated with any e-learning platform. …”
    Get full text
    Get full text
    Get full text
    Article