Search Results - (( develop computer selection algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- computer selection »
- develop computer »
- data detection »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For fingerprint database optimisation, novel access point (AP) selection algorithms which are based on variant AP selection are investigated to improve computational accuracy compared to existing AP selection algorithms such as Max-Mean and InfoGain. …”
Get full text
Get full text
Thesis -
12
-
13
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Apart from that, sizing algorithm with DEA was also discovered to outperform sizing algorithms with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Optimal source substation location selection in radial distribution networks
Published 2004“…New computer algorithm has been developed to select the optimal location of source substation in radial distribution networks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Improvement and performance analysis on statistical selection algorithms
Published 2006Get full text
Get full text
Conference or Workshop Item -
18
Statistical Based Real-Time Selective Herbicide Weed Classifier
Published 2007Get full text
Get full text
Conference or Workshop Item -
19
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm
Published 2017“…The purpose of this study is to assist potential developers in selecting the most suitable cuckoo search variant, provide proper guidance in future modifications and ease the selection of the optimal cuckoo search parameters. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006Get full text
Get full text
Conference or Workshop Item
