Search Results - (( java _ ((selection algorithm) OR (detection algorithm)) ) OR ( basic computing data algorithm ))
Search alternatives:
- basic computing »
- computing data »
- data algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…We focus on the outlier detection and background subtraction on image. This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…Due to the importance of blood vessel detection in many medical tools and the increasing demand for portable diagnosis equipment, fast blood vessel detection algorithm in a standalone and portable device is very important. …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
10
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
11
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Literature review and experiment aimed to select the fastest lightweight geo-encryption algorithms and the smallest ciphertext and key size. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Java based expert system for selection of natural fibre composite materials
Published 2013“…Computer oriented materials selection and knowledge-based expert systems are the prevailing approach in materials selection. …”
Get full text
Get full text
Get full text
Article -
14
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
15
CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media
Published 2022“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
16
CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics
Published 2019“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
17
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
18
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…Students will be taught to solve problems involving the 5 basic algorithms of summation, average, counting, as well as determining the minimum and maximum values of a set of data. …”
Get full text
Get full text
Get full text
Teaching Resource -
19
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
20
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis
