Search Results - (( developing formulation based algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- developing formulation »
- formulation based »
- method algorithm »
- java detection »
-
1
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
4
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
7
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Correlation Feature Selection Weighting Algorithms for Better Support Vector Classification: An Empirical Study
Published 2020“…Proposed cfsw-SVM algorithms are then developed. Proposed formulations on SVM regularization parameter provides synergistic adjustments between prediction or classification accuracy and the level of correlations among features in the SVM implemented. …”
Get full text
Get full text
Get full text
Article -
11
An Algorithm to Define Emotions Based on Facial Gestures as Automated Input in Survey Instrument
Published 2016“…Features of facial gestures that play important role in creating emotions are selected to be formulated in the algorithm.The aim of this paper is to produce an algorithm to define emotions based on three facial features namely mouth, eyes, and eyebrows.This is done by studying users and the problem domain, analyzing the relationship between emotions and facial gestures, and formulating solutions to the problem.This algorithm will be useful in developing a more interactive survey instrument and improving user interaction between researchers and dyslexic children.…”
Get full text
Get full text
Article -
12
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
13
Kinematic contact-impact algorithm with friction
Published 2001“…The developed algorithm is based on conservation of momentum and coefficient of restitution. …”
Get full text
Get full text
Article -
14
A New Optimization Algorithm based on Copulation Behavior of Simine Jackals
Published 2011Get full text
Conference or Workshop Item -
15
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…Two controller design formulations are proposed. The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman
Published 2021“…Initially, Iterative-based Sizing Algorithm (ISA) which uses the non-computational intelligence-based approach is presented to serve as the benchmark for computational intelligence (CI)-based sizing algorithm. …”
Get full text
Get full text
Thesis -
17
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis -
19
Mathematical modelling of mass transfer in multi-stage rotating disc contactor column
Published 2006“…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later re¯ned to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
Get full text
Get full text
Get full text
Monograph -
20
Multi-objective genetic algorithm driven formulation of a plant-based probiotic premix powder: Nutrient-cost modeling, microstructural characterization and sensory validation
Published 2026“…This study presents a multi-objective genetic algorithm (NSGA-II) driven framework for the rational formulation of a plant-based probiotic premix powder under simultaneous nutritional and economic constraints. …”
Get full text
Get full text
Get full text
Article
