Search Results - (( evolution information detection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- evolution information »
- information detection »
- implication based »
- java implication »
-
1
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
Get full text
Get full text
Thesis -
3
From sensing to predictions and database technique: a review of TV white space information acquisition in cognitive radio networks
Published 2017“…The evolution trends are spectrum sensing, prediction algorithm and recently, geo-location database technique. …”
Get full text
Get full text
Get full text
Article -
4
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
5
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
6
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…To solve the problem, this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately. The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
Get full text
Get full text
Get full text
Article -
7
-
8
An improved mobility state detection mechanism for femtocells in LTE networks
Published 2022“…This research investigates energy efficiency for femtocell mobility state detection algorithms to increase the QoS in LTE and advanced LTE networks (5G/6G networks). …”
Get full text
Get full text
Conference or Workshop Item -
9
An improved mobility state detection mechanism for femtocells in LTE networks
Published 2022“…This research investigates energy efficiency for femtocell mobility state detection algorithms to increase the QoS in LTE and advanced LTE networks (5G/6G networks). …”
Get full text
Get full text
Conference or Workshop Item -
10
An improved mobility state detection mechanism for femtocells in LTE networks
Published 2022“…This research investigates energy efficiency for femtocell mobility state detection algorithms to increase the QoS in LTE and advanced LTE networks (5G/6G networks). …”
Get full text
Get full text
Conference or Workshop Item -
11
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
12
-
13
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
Published 2021“…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
Get full text
Get full text
Thesis -
14
Intersection Features For Android Botnet Classification
Published 2019“…The evolution of the Internet of things (IoT) has made a significant impact and availed opportunities for mobile device usage on human life. …”
Get full text
Get full text
Get full text
Article -
15
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis -
16
Audio files comparator using wavelet transform and similarity metrics
Published 2025“…Despite these variations, the tunes or pitches of songs remain recognizable to the human ear and even audio detection algorithms. With the proliferation of digital music, people download songs from music applications or the internet, whether for personal listening in vehicles or to play in parties. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Diagnosis of voice disorders using band energy spectrum in wavelet domain
Published 2011Get full text
Working Paper -
18
Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection
Published 2016“…The robotic hand system comprises a new algorithm for data extraction and signal processing analysis that are measured from an object re-gripping operation based on slip detection information. …”
Get full text
Get full text
Thesis -
19
A novel approach based on machine learning and public engagement to predict water-scarcity risk in urban areas
Published 2022“…The five algorithms that were used in this work indicated that diagnosing WSR using PP achieved good-to-perfect accuracy. …”
Get full text
Get full text
Article -
20
Geospatial Based Application for Dam Planning and Monitoring in Malaysia: A Review
Published 2024“…This is enhanced by the evolution of algorithms and models that will induce efficient monitoring at a wider coverage area. � The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023.…”
Book chapter
