Search Results - (( evolution information integration algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- information integration »
- evolution information »
- integration algorithm »
- implication based »
- java implication »
-
1
-
2
Hybrid Meta-Heuristic Algorithms For Solving Vehicle Routing Problems
Published 2021Get full text
Get full text
Thesis -
3
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
4
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
5
-
6
An improved grey wolf with whale algorithm for optimization functions
Published 2022“…Therefore, to overcome the problem of poor exploration in the GWO the exploration part of the Whale optimization algorithm (WOA) is integrated in it. The resultant Grey Wolf Whale Optimization Algorithm (GWWOA) offers better exploration ability and is able to solve the optimization problems to find the most optimal solution in search space. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry.The malicious software which is specifically designed to disrupt,damage,or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still inaccurate in distinguishing the malware activities and ineffective.To solve the problem,this paper proposed the integrated machine learning methods consist of J48 and JRip in detecting the malware accurately.The integrated classifier algorithm applied to examine,classify and generate rules of the pattern and program behaviour of system call information.The outcome then revealed the integrated classifier of J48 and JRip outperforming the other classifier with 100% detection of attack rate. …”
Get full text
Get full text
Get full text
Article -
8
An Analysis Of System Calls Using J48 And JRip For Malware Detection
Published 2018“…The integrated classifier algorithm applied to examine, classify and generate rules of the pattern and program behaviour of system call information. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
-
12
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
13
Remote sensing technologies for unlocking new groundwater insights: a comprehensive review
Published 2024“…This study examined recent advances in remote sensing (RS) techniques used for the quantitative monitoring of groundwater storage changes and assessed their current capabilities and limitations. The evolution of the techniques analyses spans from empirical reliance on sparse point data to the assimilation of multi-platform satellite measurements using sophisticated machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
16
Evolving fuzzy grammar for crime texts categorization
Published 2015“…Results show that the EFG algorithm produces results that are close in performance with the other ML methods while being highly interpretable, easily integrated into a more comprehensive grammar system and with lower model retraining adaptability time.…”
Get full text
Get full text
Get full text
Article -
17
Remote monitoring system for electricity meter using ESP32CAM and OCR analysis using MATLAB
Published 2024Get full text
Get full text
Conference or Workshop Item -
18
Spatial domain image steganography based on right most digit replacement and parity bit differencing / Mehdi Hussain
Published 2017“…In encryption, sensitive information transforms into meaningless data with observable existence, while steganography embeds the secret information inside an object (i.e. image, video, text, and audio) with invisible existence. …”
Get full text
Get full text
Get full text
Thesis -
19
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…In recent years, the realm of information technologies has undergone continual evolution, marked by significant progress in cloud computing, big data analytics, and the Internet of Things (IoT). …”
Get full text
Get full text
Get full text
Article
