Search Results - (( developing audit selection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- selection algorithm »
- data normalization »
- developing audit »
- audit selection »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
4
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
6
Optimal load management strategy for enhanced time of use (ETOU) electricity tariff in Peninsular Malaysia / Mohamad Fani Sulaima
Published 2020“…Self-organizing mapping algorithm was integrated with the PSO, EPSO, and ACO algorithms to classify and select the best load management (LM) strategies. …”
Get full text
Get full text
Thesis -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
8
Developing best practice guidelines for oral cancer management in Malaysia / Aznilawati Abdul Aziz
Published 2017“…The final 47-pages Malaysian guidelines comprised three similar sections as in the draft, eighty-eight recommendations, an algorithm, and clinical audit indictors for quality management. …”
Get full text
Get full text
Get full text
Thesis -
9
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…For this purpose, recent research articles have been selected for review. In this writing review, a portion of the ongoing papers on crack identification have been evaluated and the investigation of the audit is being done on image processing strategies. …”
Get full text
Get full text
Article -
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
