Search Results - (( development program normalization algorithm ) OR ( java three detection algorithm ))
Search alternatives:
- normalization algorithm »
- program normalization »
- development program »
- java »
-
1
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
3
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
Get full text
Get full text
Thesis -
6
Parallel computation of maass cusp forms using mathematica
Published 2013“…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
Get full text
Get full text
Thesis -
7
Solving non-convex economic dispatch problem using computational intelligence technique
Published 2023Conference Paper -
8
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
9
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis -
10
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Validation was conducted through three experiments involving four Java programs. The results demonstrated high effectiveness, with scores ranging from 93.91% to 99.51% on the scaled weighted average percentage of faults detected (APFD) metric. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
Hybrid genetic algorithm for improving fault localization
Published 2018Get full text
Get full text
Get full text
Article -
16
-
17
Data mining in network traffic using fuzzy clustering
Published 2003“…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
Get full text
Get full text
Thesis -
18
Data mining in network traffic using fuzzy clustering
Published 2003“…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
Get full text
Get full text
Thesis -
19
Multi -Objective Economic Dispatch Using Evolutionary Programming
Published 2023“…The designated algorithm of MOEP used MATLAB to run the simulations. …”
-
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article
