Search Results - (( developing knowledge utilization algorithm ) OR ( java data detection algorithm ))
Search alternatives:
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…This knowledge is then converted into computer program or by utilizing exhaustively trained and tested Artificial Intelligence (AI) algorithm. …”
Get full text
Get full text
Thesis -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
Get full text
Get full text
Thesis -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…However, in this thesis, the algorithm based on inspiration of the honeybee’s behavior is improved to manage and improve energy utilization of the mobile multi-robot to emulate the working and foraging behavior. …”
Get full text
Get full text
Thesis -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
10
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
11
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Hybrid group decision making method based on multi-granular information using fusion algorithms and consistent fuzzy preference relation / Siti Amnah Mohd Ridzuan
Published 2017“…While for multigranular uncertain linguistic information, the evaluation will be aggregated into CLFPR values and the final preference of the alternative will be determined using a method of ranking fuzzy numbers. Both algorithm been illustrated in textbook selection. The proposed methods can be utilized as another option to solve a decision making problem.…”
Get full text
Get full text
Thesis -
14
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…Finally, an algorithm is developed for automatic evaluation of external validity measures on the generated variant multiclass clustering results. …”
Get full text
Get full text
Thesis -
15
Determination Of Heat Transfer Coefficients In Heat Exchangers By Genetic Algorithm
Published 2010“…Genetic algorithm (GA), developed by John Holland in the 1970s, is gaining widespread attention throughout the years. …”
Get full text
Get full text
Final Year Project -
16
Rule-based filtering algorithm for textual document
Published 2017“…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
Get full text
Get full text
Get full text
Article -
17
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…The Machine Learning Method is utilized for this task, which gives the computer the ability to learn. …”
Get full text
Get full text
Thesis -
18
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…New automatic contingency analysis and ranking algorithm due to line and generator outages were separately developed considering the FVSI value. …”
Get full text
Get full text
Thesis -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Assisting novice researchers in utilizing the web as a platform for research: semantic approach
Published 2009“…Thus, the purpose of this paper is to explore each of these support features and suggest state-of-the art development approach by utilizing Semantic Web technologies. …”
Get full text
Get full text
Get full text
Article
