Search Results - (( java application using algorithm ) OR ( pattern detection search algorithm ))
Search alternatives:
- pattern detection »
- java application »
- detection search »
- using algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
3
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
4
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…In a source searching task, two possible scenarios can occur: source detected and source not detected. …”
Get full text
Get full text
Thesis -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…The aim of data mining is to search and find undetermined patterns in huge databases. …”
Get full text
Get full text
Thesis -
6
Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm
Published 2019“…Other color model such as HSV and benchmarked algorithm are having slightly low detection rates due to some false face detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…Thus, this study proposes an enhanced binary grey wolf optimiser (EBGWO) algorithm for FS in anomaly detection to overcome the algorithm issues. …”
Get full text
Get full text
Thesis -
8
Investigation of block matching algorithm for video coding
Published 2013“…In this research, seven types of famous BMA techniques that are Exhaustive Search (ES), Three Step Search (TSS), New Three Step Search (NTSS), Simple and Efficient Three Step Search (SETSS), Four Step Search (4SS), Diamond Search (DS) and Adaptive Rood Pattern Search (ARPS) have been applied. …”
Get full text
Get full text
Get full text
Thesis -
9
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…(SESB) to reduce their distribution loss, estimated around 15% at present in Sabah State, Malaysia. The hybrid algorithm is able to preselect customers to be inspected on-site for abnormalities or potential fraud according to their consumption patterns. …”
Conference Paper -
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa
Published 2017“…The more number of marbles, the higher the search accuracy. In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
Get full text
Get full text
Thesis -
12
-
13
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
14
Heart disease prediction using artificial neural network with ADAM optimization and harmony search algorithm
Published 2025“…Complementing this, the Harmony Search Algorithm (HSA) is incorporated to augment data features, facilitating better pattern recognition and enhancing overall classification accuracy through optimized feature engineering. …”
Get full text
Get full text
Get full text
Article -
15
Fraud Detection in Shipping Industry using K-NN Algorithm
Published 2023“…Nearest neighbor search; Pattern recognition; Ships; Data driven; E- commerces; Fraud detection; Global trade; k-NN algorithm; Shipping companies; Shipping industry; Technological innovation; Trade liberalizations; Volume growth; Crime…”
Article -
16
-
17
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
Get full text
Get full text
Article -
18
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
19
-
20
A novel peak detection algorithm using particle swarm optimization for chew count estimation of a contactless chewing detection
Published 2022“…As the individual chewing pattern varies from person to person, this article uses a novel parameter search using the PSO method to find the multiplier (parameter values) according to the average peak prominence and width value within each chewing episode. …”
Get full text
Get full text
Get full text
Article
