Search Results - (( features solution means algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- features solution »
- testing algorithm »
- java application »
- means algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…This research presents a two-phase phishing detection system by employing unsupervised feature selection and supervised classification. In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
Get full text
Get full text
Get full text
Article -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…The combined method is called Hybrid K-MeansCGA. Modifications of K-Means structures were done by inserting genetic algorithm operators and tuning the population. …”
Get full text
Get full text
Thesis -
5
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
Get full text
Get full text
Get full text
Article -
6
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
Get full text
Get full text
Thesis -
7
Towards a better feature subset selection approach
Published 2010“…The selection of the optimal features subset and the classification has become an important issue in the data mining field.We propose a feature selection scheme based on slicing technique which was originally proposed for programming languages.The proposed approach called Case Slicing Technique (CST).Slicing means that we are interested in automatically obtaining that portion 'features' of the case responsible for specific parts of the solution of the case at hand.We show that our goal should be to eliminate the number of features by removing irrelevant once.Choosing a subset of the features may increase accuracy and reduce complexity of the acquired knowledge.Our experimental results indicate that the performance of CST as a method of feature subset selection is better than the performance of the other approaches which are RELIEF with Base Learning Algorithm (C4.5), RELIEF with K-Nearest Neighbour (K-NN), RELIEF with Induction of Decision Tree Algorithm (ID3) and RELIEF with Naïve Bayes (NB), which are mostly used in the feature selection task.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The results showed that using canopy as a preprocessing step cut the time it proceeds to deal with the significant number of power load abnormalities found in parallel using a fast density peak dataset and the time it proceeds for the k-means algorithm to run. Additionally, tests demonstrate that combining canopy and the K-means algorithm to analyze data performs consistently and dependably on the Hadoop platform and has a clustering result that offers a scalable and effective solution for power system monitoring. ? …”
Article -
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Dynamic Economic Dispatch For Power System
Published 2016“…Through an appropriate utilization of the structural features of the model, a solution algorithm based on Particle Swarm Optimization is developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Taguchi's T-method with nearest integer-based binary bat algorithm for prediction
Published 2023“…A reduction in the total number of features results in a less complex model. Based on the general observation, the nearest integer-based binary bat algorithm successfully optimized the selection of significant features due to recursive and repetitive searchability, in addition to its adaptive element in response to the current best solution in guiding the search process towards optimality. � 2022, Institute of Advanced Engineering and Science. …”
Article -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
-
17
Physics-guided deep neural network to characterize non-Newtonian fluid flow for optimal use of energy resources
Published 2021“…The statistical error estimation exhibits a mean absolute error of 11.5, and root mean squared error of 0.87. …”
Get full text
Get full text
Article -
18
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…The received signal strength of the maximum, median, and mean of all statistical features has been shown to be significant specifically for the 10Hz sample size. …”
Get full text
Get full text
Thesis -
19
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…Additionally, the research restricts the number of variables through feature selection to enhance the performance of the algorithm. …”
Get full text
Get full text
Thesis -
20
A real-time mobile notification system for inventory stock out detection using SIFT and RANSAC
Published 2020“…The proposed method is a machine learning based real-time notification system using the exciting Scale Invariant Feature Transform feature detector (SIFT) and Random Sample Consensus (RANSAC) algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article
