Search Results - (( developing construct maximization algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- construct maximization »
- maximization algorithm »
- developing construct »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
Dual vector control strategy for a three-stage hybrid cascaded multilevel inverter
Published 2010“…The inverter has been constructed and the control algorithm has been implemented. …”
Get full text
Get full text
Get full text
Article -
7
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…In order to increase the system efficiency and maximize the power generation, constructed operation models were optimized. …”
Get full text
Get full text
Get full text
Thesis -
8
Underwater Acoustic Communication (UWA) Data Packet Size Optimization based on Throughput
Published 2010“…The main contribution of this project is the algorithm and the lookup table construction developed for selecting optimal packet size in underwater communication efficiency.…”
Get full text
Get full text
Final Year Project -
9
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
Get full text
Get full text
Get full text
Article -
10
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
11
Novel vector control method for three-stage hybrid cascaded multilevel inverter
Published 2011“…The inverter has been constructed, and the control algorithm has been implemented. …”
Get full text
Get full text
Article -
12
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…Compact Lowest Common Ancestor (CLCA) and Maximal Compact Lowest Common Ancestor (MCLCA) implemented in algorithms named CGTreeGenerator and MCCTreeGenerator has been proven in returning an accurate result in answering XML keyword query. …”
Get full text
Get full text
Thesis -
13
Prime-based method for interactive mining of frequent patterns
Published 2010“…Then, the proposed method is developed based on the architecture such that the mining model is constructed once, and it can be frequently mined by various minsup. …”
Get full text
Get full text
Thesis -
14
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
15
Solving an application of university course timetabling problem by using genetic algorithm
Published 2022“…Among the approaches, genetic algorithm (GA), constructed based on Darwin's theory of evolution, becomes the renowned approach to solve various types of timetabling problems. …”
Get full text
Get full text
Get full text
Thesis -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure‑free electroencephalography signals
Published 2017“…Instead of using the complete set of the extracted features to construct a wavelet neural networks-based classifier, an optimal feature subset that maximizes the predictive competence of the classifier was selected by using the CSA. …”
Get full text
Get full text
Get full text
Article -
18
Modeling and Optimization of Tapered Rectangular Thin-walled Columns Subjected to Oblique Loading for Impact Energy Absorption
Published 2013“…FEA results of SEA is obtained from the analyses and later will be used for constructing response surface model (RSM). RSM is employed to determine the value of design variables of the thin-walled tubes so as to maximize the SEA when impact occurs. …”
Get full text
Get full text
Conference or Workshop Item -
19
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
A novel selection of optimal statistical features in the DWPT domain for discrimination of ictal and seizure-free electroencephalography signals
Published 2018“…Instead of using the complete set of the extracted features to construct a wavelet neural networks-based classifer, an optimal feature subset that maximizes the predictive competence of the classifer was selected by using the CSA. …”
Get full text
Get full text
Article
