Search Results - (( developing filing based algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- developing filing »
- method algorithm »
- java detection »
- filing based »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…Nevertheless commonly people use a different application for presenting those each multimedia element files type. This paper describes a multipurpose integrated multimedia presentation system (IMPS) based on channel controller model (CCM) algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…In this study, a Gene Ontology (GO) based protein sequence annotation tool named extended UTMGO is developed to meet these features. …”
Get full text
Get full text
Monograph -
8
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
Get full text
Get full text
Get full text
Article -
9
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
11
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
On the Identification of FOSD-based Non-zero Onset Speech Dataset
Published 2020Get full text
Get full text
Conference or Workshop Item -
13
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
14
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Statistical fixed range multiple selection algorithm for peer-to-peer system
Published 2010“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged in ascending order in the local file. …”
Get full text
Get full text
Conference or Workshop Item -
16
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…This algorithm is developed based on the statistical knowledge about the uniform distribution nature of the data which has been arranged according to certain order in the file. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Development of Digital Image Processing Algorithms via FPGA Implementation
Published 2024“…Several digital image processing algorithms have been developed in this project, which are gray level transformation, brightness manipulation, contrast adjustment, thresholding, and inversion. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…In addition to that, geolocation technique is implemented to provide a better information in terms of the complainant’s location, and together with the utilization of a rule-based algorithms based on priority to provide the local council a better insight on the issue. …”
Get full text
Get full text
Get full text
Book Section -
20
