Search Results - (( java data detection algorithm ) OR ( program specialization techniques algorithm ))
Search alternatives:
- specialization techniques »
- program specialization »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
Get full text
Get full text
Student Project -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…Researches indicated there are many factors can affect student programming performance.Thus, the aim of this study is to investigate the significant factors that may influence students programming performance based information from previous student performance using data mining technique. …”
Get full text
Get full text
Get full text
Article -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
11
-
12
An efficient method for audio watermarking using SWT and mean value quantization
Published 2016“…Digital watermarking has been capturing the interests in programming society several decades ago due to the development of software and programming techniques that cause an increase in illegal use of digital files. …”
Get full text
Get full text
Thesis -
13
Speed control of separately excited dc motor using artificial intelligent approach
Published 2013“…A neural network controller with learning technique based on back propagation algorithm is developed. …”
Get full text
Get full text
Get full text
Thesis -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
15
Hybrid evolutionarybarnacles mating optimisation-artificial neural network based technique for solving economic power dispatch planning and operation / Nor Laili Ismail
Published 2024“…The third algorithm was validated on IEEE 30-Bus RTS only. Comparative studies were conducted concerning the traditional Evolutionary Programming (EP) and Barnacles Mating Optimiser (BMO) for performance evaluation of HEBMO and MOHEBMO. …”
Get full text
Get full text
Thesis -
16
-
17
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…Results: Based on the findings, neural network scored the highest overall accuracy of 98.6% after conducting filtering technique. Furthermore, reliefF-Gradient boosting and random forest algorithms achieved promising overall accuracy of 97.4% and 96.9%, respectively after implementing filtering and feature selection techniques. …”
Get full text
Get full text
Get full text
Article -
19
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
