Search Results - (( exploring density function algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- function algorithm »
- exploring density »
- density function »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Comparison of expectation maximization and K-means clustering algorithms with ensemble classifier model
Published 2018“…Expectation maximization (EM) is one of the representatives clustering algorithms which have broadly applied in solving classification problems by improving the density of data using the probability density function. …”
Get full text
Get full text
Get full text
Article -
6
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…Improved mean fitness function values were also revealed in the TRS (11.63%) and EMPS (69.63%) assessments, surpassing the conventional algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
An Improved Archimedes Optimization Algorithm for Solving Optimization Problems
Published 2024“…These enhancements are subjected to rigorous evaluation using 23 benchmark functions, and their performance is compared against that of the original AOA and other prominent algorithms, including the Multiverse Optimization (MVO), Grasshopper Optimization Algorithm (GOA), Sine Cosine Algorithm (SCA), and Ant Lion Optimizer (ALO). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
11
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
12
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…Experimental results of the proposed strategy are compared with other advanced meta-heuristic algorithms using the Otsu and Kapur fitness functions. …”
Get full text
Get full text
Get full text
Article -
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
14
A memory-guided Jaya algorithm to solve multi-objective optimal power flow integrating renewable energy sources
Published 2025“…Addressing the uncertainty and intermittence inherent in renewable energy sources (RES), Weibull and lognormal probability density functions are employed for RES availability estimation. …”
Review -
15
A hyper-heuristic based strategy for image segmentation using multilevel thresholding
Published 2025“…Experimental results of the proposed strategy are compared with other advanced meta-heuristic algorithms using the Otsu and Kapur fitness functions. …”
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Determining gender differential item functioning for mathematics in coeducational school culture
Published 2018“…Sources of DIF are linguistics density and item presentation style. The findings suggest that with only two moderate DIF mathematics items, there is insufficient evidence to suggest that the mathematics items functioned differently between boys and girls in school culture noted for successful mathematics learning, even though linguistics complexities of the test language cannot be ignored.Significance - While constructing Mathematics multiple choice items, careful considerations need to be given in selecting suitable numbers in composing the content of the item so that, only the correct algorithm would produce the correct answer ‘if and only if’ those numbers are used. …”
Get full text
Get full text
Get full text
Article -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise
