Search Results - solution ((((validation technique) OR (computing techniques))) OR (learning techniques))

Refine Results
  1. 1
  2. 2

    Menyemak Jawapan Soalan Subjektif Menggunakan Pendekatan Pemprosesan Bahasa Tabii by Abas, Zulhazlin

    Published 2006
    “…The learning system in this study utilizes the natural language processing technique in order to receive subjective answers from the users. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Determination of suitable resource discovery tool and methodology for high-volume internet of things (IoT) by Jamal, A.A., Bakar, M.T.A.

    Published 2021
    “…The findings empirically support the validation of the Q-Learning model improvement for high-volume IoT resource discovery cases. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Breast Cancer Detection by Hybrid Techniques based on Deep Learning Networks by Azlan, N.A.N., Elamvazuthi, I., Tang, T.B., Lu, C.-K.

    Published 2021
    “…Lastly, k-fold cross-validation techniques were executed to validate the results and obtained the average reading for both training and testing datasets. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz by Muhammad , Shiraz

    Published 2013
    “…Therefore, lightweight techniques are imperative for the processing of computational intensive applications in MCC. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of DDoS attacks in IoT networks using machine learning algorithms by Abdulrahman Alwan, Alwan Ahmed, Shah, Asadullah, Abdulrahman Alwan, Alwan Abdullah, Laghari, Shams Ul Arfeen

    Published 2025
    “…Future work will focus on exploring additional feature selection methods, integrating deep learning techniques, and validating the models in real-world IoT environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Enhancing phishing detection with advanced ensemble learning techniques by Nur Syakirin Mohd Shahiran, Mohammed Ahmed

    Published 2025
    “…This study introduces an advanced phishing detection model that leverages ensemble learning techniques to improve accuracy, robustness, and adaptability. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A high-performance neural network algorithm using a Legendre ensemble-based extreme learning machine for solving fractional partial differential equations by Isah, Ibrahim Onimisi, Senu, Norazak, Ahmadian, Ali

    Published 2025
    “…The recent advancement in the use of machine learning techniques across various fields has paved the way for innovative approaches to solving fractional partial differential equations (FPDEs), particularly those utilizing neural networks (NNs). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Deep learning based fuzzy-MPC controller for satellite combined energy and attitude control system by Aslam, Sohaib, Chak, Yew-Chung, Jaffery, Mujtaba Hussain, Varatharajoo, Renuganth, Razoumny, Yury

    Published 2024
    “…Therefore, the novel Deep-Learning solution provides a feasible platform for applying more complicated and sophisticated attitude control techniques for the CEACS attitude regulation in small satellites as an example. © 2024 COSPAR…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Bot detection using machine learning algorithms on social media platforms by Gannarapu, Sainath, Dawoud, Ahmed, Ali, Rasha S., Alwan, Ali Amer

    Published 2021
    “…The research uses the bot detection technique based on machine learning algorithms. The components of the study are data, feature selection, and bot detection. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Enhanced Conditional Generative Adversarial Network For Handling Subject Variability In Human Activity Recognition by Jimale, Ali Olow

    Published 2023
    “…Elderly and adult datasets were used to evaluate the assessment techniques. Experiments on adult dataset only, experiments on elderly dataset only, and experiments on adult (as training) and elderly (as test) datasets were conducted using machine learning and deep learning. …”
    Get full text
    Get full text
    Thesis
  19. 19

    MACHINE LEARNING-BASED PREDICTIVE MODEL FOR FUTURE SAVINGS: ANALYZING MONTHLY CONSUMPTION AND EARNINGS by Shaiful Rahimi, Muhammad Norhazim

    Published 2024
    “…This project aims to address key challenges in the contemporary financial landscape by leveraging AI and ML techniques to provide innovative solutions for financial planning and decision-making. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    A review on optimization of least squares support vector machine for time series forecasting by Yusof, Yuhanis, Mustaffa, Zuriani

    Published 2016
    “…This paper presents a review on techniques used to optimize the parameters based on two main classes; Evolutionary Computation and Cross Validation.…”
    Get full text
    Get full text
    Get full text
    Article