Search Results - (( java data detection algorithm ) OR ( construct generation using algorithm ))
Search alternatives:
- construct generation »
- generation using »
- using algorithm »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…The second proposed algorithm uses SA to optimize the terms selection while constructing a rule. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
Sequential constructive algorithm incorporate with fuzzy logic for solving real world course timetabling problem
Published 2020“…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Ant system-based feature set partitioning algorithm for classifier ensemble construction
Published 2016“…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
Get full text
Get full text
Get full text
Article -
10
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Chebyshev approximation of discrete polynomials and splines
Published 2004“…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Sequential Constructive Algorithm incorporate with Fuzzy Logic for Solving Real World Course Timetabling Problem
Published 2020“…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book -
13
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…The main scope of stage II is the prediction of future power generation by using generated weather data. Accordingly, the first aspect to point out is the generation of future climate parameters. …”
Get full text
Get full text
Get full text
Thesis -
14
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…A ensemble clustering is designed, used and evaluated to generate the final classification framework that will take all input generated from the GA based clustering with Feature Selection and Feature Construction algorithms and perform the classification task for the relational datasets. …”
Get full text
Get full text
Get full text
Thesis -
15
Invigilation timetabling system using genetic algorithm (GA) / Shahirah Mohamed Hatim
Published 2011“…This system is developed for the invigilators and with the objective of constructing an invigilation timetable using Genetic Algorithm. …”
Get full text
Get full text
Thesis -
16
Optimisation of automatic generation control performance in two-area power system with pid controllers using mepso / Lu Li
Published 2018“…Also, using MEPSO-TVAC algorithm, the performance of AGC by using two PID controllers is better in terms of rise time and settling time than using one PID controller. …”
Get full text
Get full text
Get full text
Thesis -
17
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…A statistical test was used to demonstrate the efficiency of the proposed algorithm over the compared methods. …”
Get full text
Thesis -
18
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
20
