Search Results - (( data detection techniques algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- detection techniques »
- java optimization »
- method algorithm »
- data detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
2
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
3
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…There are various data mining tools available to analyze data related android malware detection. …”
Get full text
Get full text
Get full text
Article -
6
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
7
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
8
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
10
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
11
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
12
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
13
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
14
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
15
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
16
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…This paper systematically reviews the existing related techniques and presents extensive coverage of challenges and perspectives of anomaly detection within highdimensional and multivariate data. …”
Get full text
Get full text
Article -
17
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
Get full text
Get full text
Thesis -
18
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Further, the shortage of efficient feature selection techniques gives rise to low accuracy in anomaly detection. …”
Get full text
Get full text
Thesis -
19
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…The traditional algorithms need data preparations while unsupervised algorithms can be prepared so that they can handle the data in war format. …”
Get full text
Get full text
Article -
20
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article
