Search Results - (( developing construct maximization algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Dual vector control strategy for a three-stage hybrid cascaded multilevel inverter by Kadir, M.N.A., Mekhilef, Saad, Ping, H.W.

    Published 2010
    “…The inverter has been constructed and the control algorithm has been implemented. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios by Tayebiyan, Aida

    Published 2015
    “…In order to increase the system efficiency and maximize the power generation, constructed operation models were optimized. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Underwater Acoustic Communication (UWA) Data Packet Size Optimization based on Throughput by VIRAKRAINGSEI, HAI SOCHEAT

    Published 2010
    “…The main contribution of this project is the algorithm and the lookup table construction developed for selecting optimal packet size in underwater communication efficiency.…”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Novel vector control method for three-stage hybrid cascaded multilevel inverter by Mekhilef, Saad, Kadir, M.N.A.

    Published 2011
    “…The inverter has been constructed, and the control algorithm has been implemented. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…Compact Lowest Common Ancestor (CLCA) and Maximal Compact Lowest Common Ancestor (MCLCA) implemented in algorithms named CGTreeGenerator and MCCTreeGenerator has been proven in returning an accurate result in answering XML keyword query. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Then, the proposed method is developed based on the architecture such that the mining model is constructed once, and it can be frequently mined by various minsup. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Solving an application of university course timetabling problem by using genetic algorithm by Norhana, Shaibatul Khadri

    Published 2022
    “…Among the approaches, genetic algorithm (GA), constructed based on Darwin's theory of evolution, becomes the renowned approach to solve various types of timetabling problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals by Ong, Pauline, Zainuddin, Zarita, Kee, Huong Lai

    Published 2017
    “…Instead of using the complete set of the extracted features to construct a wavelet neural networks-based classifier, an optimal feature subset that maximizes the predictive competence of the classifier was selected by using the CSA. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption by Siti Aishah, Rusdan, Tarlochan, Faris, Mohamad Rusydi, Mohamad Yasin

    Published 2013
    “…FEA results of SEA is obtained from the analyses and later will be used for constructing response surface model (RSM). RSM is employed to determine the value of design variables of the thin-walled tubes so as to maximize the SEA when impact occurs. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals by Ong, Pauline, Zainuddin, Zarita, Kee, Huong Lai

    Published 2018
    “…Instead of using the complete set of the extracted features to construct a wavelet neural networks-based classifer, an optimal feature subset that maximizes the predictive competence of the classifer was selected by using the CSA. …”
    Get full text
    Get full text
    Article