Search Results - (( java application optimization algorithm ) OR ( software detection mining algorithm ))
Search alternatives:
- application optimization »
- software detection »
- java application »
- detection mining »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
-
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
4
-
5
-
6
-
7
Obligation and Prohibition Norms Mining Algorithm for normative multi-agent systems
Published 2023Conference paper -
8
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007Get full text
Get full text
Conference or Workshop Item -
9
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Software requirement specification (SRS) document is the most crucial document in software development process. …”
Get full text
Get full text
Get full text
Thesis -
10
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
11
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
12
A proposed norms' benefits awareness framework for norms adoption
Published 2023“…Algorithms; Multi agent systems; benefits awareness; Mining algorithms; Normative system; norms; Norms detections; Software agents…”
Conference Paper -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003Get full text
Get full text
Thesis -
15
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
19
-
20
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Anomaly detection, sometimes referred to as outlier analysis is a data mining procedure that detects events, data points, and observations that deviates from the expected behaviour of a dataset. …”
Get full text
Get full text
Article
