Search Results - (( features generation learning algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- features generation »
- generation learning »
- application testing »
- learning algorithm »
- testing algorithm »
- java application »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
-
5
Wind power forecasting with metaheuristic-based feature selection and neural networks
Published 2024“…Specifically, five distinct algorithms - Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Teaching-Learning-Based Optimization (TLBO), and Evolutionary Mating Algorithm (EMA) - are integrated with NN model to identify optimal feature subsets from a comprehensive dataset of 18 diverse features. …”
Get full text
Get full text
Get full text
Article -
6
Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms
Published 2022“…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
Get full text
Get full text
Article -
7
Machine learning of tax avoidance detection based on hybrid metaheuristics algorithms
Published 2022“…The machine learning models employed automated features selection with hybrid two metaheuristics algorithms namely particle swarm optimization (PSO) and genetic algorithm (GA). …”
Get full text
Get full text
Article -
8
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
Published 2024“…This requires the generator to learn how to generate images from partially damaged data, leading to better representations learned from the data. …”
Get full text
Get full text
Thesis -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
10
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
Get full text
Get full text
Thesis -
11
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021“…Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Attacks detection in 6G wireless networks using machine learning
Published 2023“…The second stage involves the feature selection approach. Correlation Feature Selection algorithm (CFS) is used to implement the suggested hybrid strategy. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
A Systematic Literature Review of Machine Learning Methods for Short-term Electricity Forecasting
Published 2023Conference Paper -
15
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…Moreover, log files have a lot of irrelevant and redundant features that act as noise. Also, log files are heterogenous and cannot fed them directly in machine learning algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
A YOLO-based deep learning model for Real-Time face mask detection via drone surveillance in public spaces
Published 2024“…A data augmentation algorithm is used for feature generation to enhance the model’s training robustness. …”
Get full text
Get full text
Get full text
Article -
17
Information fusion and data augmentation with deep features for a deep learning-based baby cry recognition / Zhang Ke
Published 2024“…Two deep learning models, i.e. VGG16 and VGG19 are used to extract the deep features. …”
Get full text
Get full text
Get full text
Thesis -
18
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. However, most of these studies utilized flow features with no feature transformation or relied on inefficient flow feature transformations like frequency-based periodicity analysis and outliers percentage. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
An evolutionary based features construction methods for data summarization approach
Published 2015“…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
Get full text
Get full text
Research Report
