Search Results - (( developing reduction methods algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- developing reduction »
- reduction methods »
- methods algorithm »
- method algorithm »
- java detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Loss reduction in distribution networks using new network reconfiguration algorithm
Published 1996“…Therefore, the solution algorithm of the proposed method can identify the most effective branch exchange operations for loss reduction, with a minimum computational efforts. …”
Get full text
Article -
7
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Loss reduction in distribution networks by network reconfiguration: a two stage solution approach
Published 2004“…Therefore, the solution algorithm of the proposed method can identify the most effective branch exchange operations for loss reduction, with minimum computational efforts. …”
Get full text
Get full text
Conference or Workshop Item -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
Active intelligent control of vibration of flexible plate structures
Published 2011“…The approach is first realised within a single-input single-output (SISO) control configuration with RLS, RCGA, PSO and AIS algorithms. Tests with various disturbance signals show that good vibration reduction is achieved with the developed model-based SISO-AVC algorithms. …”
Get full text
Get full text
Thesis -
12
Numerical Integration And Data Reduction For Application In Photometry
Published 2003“…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
Get full text
Get full text
Thesis -
13
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…Simulation and experimental results have shown that the developed THF-NLFXLMS achieves additional noise reduction of 19% from that being achieved by the linear FXLMS algorithm.…”
Get full text
Get full text
Thesis -
14
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…In this work a feeder reconfiguration algorithm is presented for the purpose of power loss reduction in distribution networks. …”
Get full text
Get full text
Thesis -
15
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
16
The Parameter Reduction of the Interval-Valued Fuzzy Soft Sets and Its Related Algorithms
Published 2014“…We propose four heuristic algorithms of parameter reduction. Finally, the algorithms are compared and summarized from the aspects of easy degree of finding reduction, applicability, reduction result, exact level for reduction, multiusability, applied situation, and computational complexity. …”
Get full text
Get full text
Get full text
Article -
17
New methods of partial transmit sequence for reducing the high peak-to-average-power ratio with low complexity in the ofdm and f-ofdm systems
Published 2019“…Based on the proposed methods, an improved PTS method that merges the best subblock partitioning scheme in the frequency domain and the best low-complexity algorithm in the time domain has been introduced to enhance the PAPR reduction performance better than the conventional PTS method with extremely low computational complexity level. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
19
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis
