Search Results - (( developing formulation based algorithm ) OR ( java detection method algorithm ))

Refine Results
  1. 1

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Text steganalysis using evolution algorithm approach by Din, Roshidi, Tuan Muda, Tuan Zalizam, Lertkrai, Puriwat, Omar, Mohd Nizam, Amphawan, Angela, Aziz, Fakhrul Anuar

    Published 2012
    “…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…There are many algorithm for analysing clustering each having its own method to do clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Correlation Feature Selection Weighting Algorithms for Better Support Vector Classification: An Empirical Study by Sim, Doreen Ying Ying, Teh, Chee Siong, Ahmad Izuanuddin, Ismail

    Published 2020
    “…Proposed cfsw-SVM algorithms are then developed. Proposed formulations on SVM regularization parameter provides synergistic adjustments between prediction or classification accuracy and the level of correlations among features in the SVM implemented. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An Algorithm to Define Emotions Based on Facial Gestures as Automated Input in Survey Instrument by Tayib, Saifulazmi, Jamaludin, Zulikha

    Published 2016
    “…Features of facial gestures that play important role in creating emotions are selected to be formulated in the algorithm.The aim of this paper is to produce an algorithm to define emotions based on three facial features namely mouth, eyes, and eyebrows.This is done by studying users and the problem domain, analyzing the relationship between emotions and facial gestures, and formulating solutions to the problem.This algorithm will be useful in developing a more interactive survey instrument and improving user interaction between researchers and dyslexic children.…”
    Get full text
    Get full text
    Article
  12. 12

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Kinematic contact-impact algorithm with friction by Wong, S.V., Hamouda, A.M.S., Hashmi, M.S.J.

    Published 2001
    “…The developed algorithm is based on conservation of momentum and coefficient of restitution. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…Two controller design formulations are proposed. The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman by Othman, Zulkifli

    Published 2021
    “…Initially, Iterative-based Sizing Algorithm (ISA) which uses the non-computational intelligence-based approach is presented to serve as the benchmark for computational intelligence (CI)-based sizing algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Mathematical modelling of mass transfer in multi-stage rotating disc contactor column by Arshad, Khairil Anuar, Talib, Jamalludin, Maan, Normah

    Published 2006
    “…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later re¯ned to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
    Get full text
    Get full text
    Get full text
    Monograph
  20. 20

    Multi-objective genetic algorithm driven formulation of a plant-based probiotic premix powder: Nutrient-cost modeling, microstructural characterization and sensory validation by Tang, Ping, Cui, Ming Yang, Mohsin, Aliah Zannierah, Meor Hussin, Anis Shobirin, Juhari, Nurul Hanisah

    Published 2026
    “…This study presents a multi-objective genetic algorithm (NSGA-II) driven framework for the rational formulation of a plant-based probiotic premix powder under simultaneous nutritional and economic constraints. …”
    Get full text
    Get full text
    Get full text
    Article