Search Results - (( java applications force algorithm ) OR ( network solution mining algorithm ))
Search alternatives:
- applications force »
- java applications »
- network solution »
- mining algorithm »
- force algorithm »
- solution mining »
-
1
-
2
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
Get full text
Get full text
Thesis -
3
-
4
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
5
Logic mining method via hybrid discrete hopfield neural network
Published 2025“…Despite the success, the limitations of existing logic mining methods are often overlooked, hindering the search for optimal solutions in binary classification tasks. …”
Get full text
Get full text
Get full text
Article -
6
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
7
Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability
Published 2024“…This ensured that the optimized states achieved maximum diversity and reach global minima solutions with the lowest similarity index, thereby enhancing the overall performance of the network. …”
Get full text
Get full text
Get full text
Article -
8
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Though, numerous studies have contributed in various ways to improve the utilization of data mining for IDS, effective solution often depends on the network setting where the IDS is deployed. …”
Get full text
Get full text
Article -
9
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Though, numerous studies have contributed in various ways to improve the utilization of data mining for IDS, effective solution often depends on the network setting where the IDS is deployed. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…This work proposed a new hybridised network of 3-Satisfiability structures that widens the search space and improves the effectiveness of the Hopfield network by utilising fuzzy logic and a metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
12
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
13
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
16
A framework for malware identification based on behavior
Published 2012“…For malware prediction, there are four areas of malware features which are i) process, ii) file, iii) registry, and iv) network activities. The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
17
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
18
A New Hybrid K-Means Evolving Spiking Neural Network Model Based on Differential Evolution
Published 2018“…This approach improves the flexibility of the ESNN algorithm in producing better solutions which is utilized to conquer the K-means disadvantages. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
Get full text
Get full text
Get full text
Thesis -
20
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis
