Search Results - (( ((using processing) OR (data processing)) data algorithm ) OR ( java _ detection algorithm ))
Search alternatives:
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
3
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…In conclusion, diabetic ketoacidosis in unrestricted food intake conditions can be predicted using the proposed ANFIS and GA-ANFIS model. Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data
Published 2025“…Deep learning algorithms were widely used among all the data-driven algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Mapreduce algorithm for weather dataset
Published 2017“…In addition, these characteristics also contribute to the complexity on the data processing and prediction. Big Data analytics is a new concept to process the Big Data. …”
Get full text
Get full text
Thesis -
9
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
10
An efficient parallel clustering algorithm on big data using Spark
Published 2022“…Here we are proposing a new parallel fuzzy clustering algorithm called "An efficient parallel clustering algorithm on big data using spark" which deals with real-time processing. …”
Get full text
Get full text
Get full text
Article -
11
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
Get full text
Get full text
Get full text
Article -
12
MapReduce algorithm for weather dataset
Published 2018“…In addition, these characteristics also contribute to the complexity on the data processing and prediction. Big Data analytics is a new concept to process the Big Data. …”
Get full text
Get full text
Research Report -
13
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…In data preprocessing, a clean and useful data is produced and become as an input for association analysis process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…Problem of the size of data happen when data cannot be process because of it too complex. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
15
Enhanced kiosks mapping on traditional market using Apriori Algorithm / Ardiansyah Dores, and Tazkiyah Herdi
Published 2021“…The algorithm used here is a priori algorithm, the data used are questionnaire data from 250 respondents, from the data taken 120 data used as training data, for the process of making data models. …”
Get full text
Get full text
Book Section -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
17
Optimized clustering with modified K-means algorithm
Published 2021“…In order to obtain the optimum number of clusters and at the same time could deal with correlated variables in huge data, modified k-means algorithm was proposed. The proposed algorithm utilised a distance measure to compute the between groups’ separation to accelerate the process of identifying an optimal number of clusters using k-means. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006“…Comparisons on the final results based on these three algorithms will be discussed in order to decide which algorithm is most favorable to be used in post-processing data thinning for cleaned MBES dataset. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The process of building the machining data knowledge (training) was successfully achieved. …”
Get full text
Get full text
Thesis -
20
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article
