Search Results - (( developing rule method algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- method algorithm »
- developing rule »
- java detection »
- rule method »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
7
Developed method of FPGA-based fuzzy logic controller design with the aid of conventional PID algorithm
Published 2009“…This method reduces the number of rules needed significantly. …”
Get full text
Get full text
Get full text
Article -
8
Comprehensive power restoration approach using rule-based method for 11kV distribution network
Published 2023“…This paper presents a restoration algorithm based on a Rule-Based approach. The algorithm is computationally programmed to provide multiple solutions and to recommend the best option of switching for a dispatcher. …”
Conference Paper -
9
Optimization of fuzzy rules design using genetic algorithm
Published 2000Get full text
Get full text
Get full text
Article -
10
Fuzzy Rules Optimization in Fuzzy Expert System for Machinability Data Selection: Genetic Algorithms Approach
Published 2001“…Genetic optimization is suggested in this paper to further optimizing the fuzzy rules optimization with genetic algorithms has been developed. …”
Get full text
Get full text
Article -
11
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA)
Published 2013“…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
Adaptive complex neuro-fuzzy inference system for non linear modeling and time series prediction
Published 2013“…The development sequence of such method can be divided into two parts: Developing network structure to employ complex fuzzy logic and proposing learning algorithm to train the system. …”
Get full text
Get full text
Thesis -
16
New Structural Evolving Algorithms For Fuzzy Systems
Published 2018Get full text
Get full text
Thesis -
17
Using fuzzy association rule mining in cancer classification
Published 2011“…In addition, creating a fuzzy classifier with high performance in classification that uses a subset of significant genes which have been selected by different types of gene selection methods is another goal of this study. A new algorithm has been developed to identify the fuzzy rules and significant genes based on fuzzy association rule mining. …”
Get full text
Get full text
Article -
18
Flexible job shop scheduling using priority heuristics and genetic algorithm
Published 2010“…In the next method, a genetic algorithm has been developed. It has been shown that proposed genetic algorithm with a reinforced initial population (GA2) has better efficiency compared to a proposed genetic algorithm with fully random initial population (GA0). …”
Get full text
Get full text
Thesis -
19
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…To achieve these objectives (the algorithm, the model and the X-bar rules), five phases of research methods involved namely identifying the research gap, the sentence and rules categorization, model and algorithm design phase, prototype development evaluation and conclusion phase. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Direct approach for mining association rules from structured XML data
Published 2012“…The implementation details shows the difference in accessing and manipulating XML v documents using java based parsers and query languages for XML and the steps needed to access an XML document until we produce a list of association rules . The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis
