Search Results - (( java data detection algorithm ) OR ( using composition using algorithm ))
Search alternatives:
- using composition »
- using algorithm »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
7
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
8
Producer gas composition prediction using artificial neural network algorithm / Mohd Mahadzir Mohammud ... [et al.]
Published 2023“…It is then used to predict the output gas composition from the parameters of a gasification experiment that has been used before in UiTM’s laboratory. …”
Get full text
Get full text
Get full text
Article -
9
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…The goal of QoS-aware service composition is to generate optimal composite services that satisfy the QoS requirements defined by clients. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
A study of progressive damage detection in thin-walled composite structures using an embedded fiber Bragg grating – acoustic emission hybrid system
Published 2019“…Finally, a signal processing algorithm was developed to locate flaws / damages and also identify the condition of a thin composite structures. …”
Get full text
Get full text
Research Report -
11
Inelastic analysis of composite sections
Published 2004“…This paper describes the development of a numerical algorithm used for the inelastic analysis of composite sections subjected to combined axial force and bending moment. …”
Get full text
Get full text
Get full text
Article -
12
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
Get full text
Get full text
Get full text
Article -
13
A concentration prediction-based crop digital twin using nutrient co-existence and composition in regression algorithms
Published 2024“…This research embarks on an exploration of the synergy between precision agriculture, crop modeling, and regression algorithms to create a digital twin for farmers to augment the concentration and composition prediction-based crop nutrient recovery. …”
Get full text
Get full text
Get full text
Article -
14
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Hardware development of ultrasonics tomography for composition determination of water and oil flow
Published 2007“…The image reconstruction algorithm that used is the Linear Back Projection (LBP) algorithm.…”
Get full text
Get full text
Article -
16
-
17
-
18
A concentration prediction-based crop digital twin using nutrient co-existence and composition in regression algorithms
Published 2024“…This pa-per presents two approaches, namely, (i) single-nutrient concentration prediction and (ii) nutrient composition concentration prediction, which is the result of a predictive digital twin case study that employs six regression algorithms, namely, Elastic Net, Polynomial, Stepwise, Ridge, Lasso, and Linear Regression, to predict rice nutrient content efficiently, particularly considering the co-existence and composition of multiple nutrients. …”
Get full text
Get full text
Get full text
Article -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Numerical simulation of hybrid composite tubes under oblique compression
Published 2017“…Generally, empty metallic tubes are used, and it is found that the energy absorption capability is lower than the energy obtained using composite materials. …”
Get full text
Get full text
Get full text
Article
