Search Results - (( (evolution OR solution) deviation detection algorithm ) OR ( java _ evolution algorithm ))
Search alternatives:
- deviation detection »
- evolution algorithm »
- java »
-
1
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
2
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
5
Omega grey wolf optimizer (ωGWO) for optimization of overcurrent relays coordination with distributed generation
Published 2019“…In Moreover, the robustness of GWO algorithm is establish with low standard deviation of 1.7142 seconds as compared to BBO. …”
Get full text
Get full text
Thesis -
6
-
7
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Enhancing CI engine performance and emission control using a hybrid RSM–Rao algorithm for ZnO-doped castor–neem biodiesel blends
Published 2025“…The former algorithm possesses the aforementioned features. Rao's algorithm does not mimic the behaviour of swarms, animals, birds, or any physical or chemical phenomenon, but it provides effective solutions to complicated problems. …”
Get full text
Get full text
Get full text
Article -
9
Mental Stress Classification Among Higher Education Students In Malaysia From Electroencephalogram (Eeg) Using Convolutional Neural Network With Modified Stochastic Gradient D...
Published 2024“…The 1D CNN model also demonstrated high sensitivity and specificity, making it a robust solution for EEG-based stress detection.…”
Get full text
Get full text
Thesis -
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…A more user-centered application through personalization and intelligent assistance technique are identified as the evolution in knowledge sharing facilitation research. …”
Get full text
Get full text
Thesis
