Search Results - (( java data detection algorithm ) OR ( construct visualization techniques algorithm ))
Search alternatives:
- visualization techniques »
- construct visualization »
- data detection »
- java »
-
1
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
Get full text
Get full text
Thesis -
2
-
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Parallel visualization approach of a 3D heart model
Published 2008Get full text
Get full text
Conference or Workshop Item -
8
Hybrid genetic algorithm for uncapacitated university examination timetabling problem
Published 2015“…All proposed algorithms are coded in C using Microsoft Visual C++ 6.0 as the compiler. …”
Get full text
Get full text
Thesis -
9
A Multidimensional Search Space Using Interactive Genetic Algorithm
Published 2010“…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
Brain Topographic Mapping of Emotions using Computational Cerebellum
Published 2013“…Several neuroimaging techniques including Electroencephalography (EEG) have been employed to capture and visualize the underlying dynamics of emotional neurophysiology. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Visual-based semantic simultaneous localization and mapping for Robotic applications: a review
Published 2019“…One of most important techniques that plays a key role in elevating a mobile robot’s independence is its ability to construct a map from an unknown surrounding in an unknown initial position, and with the use of onboard sensors, localize itself in this map. …”
Get full text
Get full text
Article -
13
-
14
-
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
16
Real-time shadow casting using fake soft shadow volume with stencil buffer
Published 2006“…Comparison using proposed algorithm with an established algorithm revealed that the proposed algorithm is two to five times faster. …”
Get full text
Get full text
Thesis -
17
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
18
Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah
Published 1999Get full text
Get full text
Thesis -
19
Unapparent information revelation for counterterrorism: Visualizing associations using a hybrid graph-based approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
20
