Search Results - (( developing ineffective program algorithm ) OR ( java evaluation modified algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S. M. M Yassin, S. M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An Analysis Of System Calls Using J48 And JRip For Malware Detection by Abdollah, Mohd Faizal, Abdullah, Raihana Syahirah, S.M.M Yassin, S.M. Warusia Mohamed, Selamat, Siti Rahayu, Mohd Saudi, Nur Hidayah

    Published 2018
    “…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad... by Mohamad Zamani, Mohamad Khairuzzaman

    Published 2019
    “…In this study, Chaotic Immune Symbiotic Organisms Search (CISOS) optimisation technique was developed with the aim of enhancing the searching capability of Symbiotic Organisms Search (SOS) technique to produce higher quality solutions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Personal mobile-health application by Lim, Jeremy Yeu Shuo

    Published 2025
    “…In order to create a secure, scalable, and highly user interactive that enables users to efficiently manage their general health, the solution will be created in an Agile environment using tools like TensorFlow Lite, Firebase, and Kotlin as the primary of programming language in this development.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
    Get full text
    Get full text
    Thesis