Search Results - (( java data detection algorithm ) OR ( using composition using algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Producer gas composition prediction using artificial neural network algorithm / Mohd Mahadzir Mohammud ... [et al.] by Mohammud, Mohd Mahadzir, Mohamad Bakre, Muhammad Syaham, Mohd Fohimi, Nor Azirah, Rabilah, Rosniza, Ahmad, Muhammad Iqbal

    Published 2023
    “…It is then used to predict the output gas composition from the parameters of a gasification experiment that has been used before in UiTM’s laboratory. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques by Qtaish, Osama Kayed Taher

    Published 2014
    “…The goal of QoS-aware service composition is to generate optimal composite services that satisfy the QoS requirements defined by clients. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A study of progressive damage detection in thin-walled composite structures using an embedded fiber Bragg grating – acoustic emission hybrid system by Mohd Hafizi, Zohari

    Published 2019
    “…Finally, a signal processing algorithm was developed to locate flaws / damages and also identify the condition of a thin composite structures. …”
    Get full text
    Get full text
    Research Report
  11. 11

    Inelastic analysis of composite sections by Thanoon, Waleed Abdulmalik, M. Hamed, Ahmed M., Noorzaei, Jamaloddin, Jaafar, Mohd Saleh, Al-Silayvani, Bayar J.

    Published 2004
    “…This paper describes the development of a numerical algorithm used for the inelastic analysis of composite sections subjected to combined axial force and bending moment. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A concentration prediction-based crop digital twin using nutrient co-existence and composition in regression algorithms by Ghazvini, Anahita, Mohd Sharef, Nurfadhlina, Balasundram, Siva Kumar, Lee, Lai Soon

    Published 2024
    “…This research embarks on an exploration of the synergy between precision agriculture, crop modeling, and regression algorithms to create a digital twin for farmers to augment the concentration and composition prediction-based crop nutrient recovery. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Hardware development of ultrasonics tomography for composition determination of water and oil flow by Abdul Rahim, Ruzairi, Ng, Wei Nyap, Fazalul Rahiman, Mohd. Hafiz

    Published 2007
    “…The image reconstruction algorithm that used is the Linear Back Projection (LBP) algorithm.…”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A concentration prediction-based crop digital twin using nutrient co-existence and composition in regression algorithms by Mohd Sharef, Nurfadhlina, Balasundram, Siva Kumar, Lai, Soon Lee, Ghazvini, Anahita

    Published 2024
    “…This pa-per presents two approaches, namely, (i) single-nutrient concentration prediction and (ii) nutrient composition concentration prediction, which is the result of a predictive digital twin case study that employs six regression algorithms, namely, Elastic Net, Polynomial, Stepwise, Ridge, Lasso, and Linear Regression, to predict rice nutrient content efficiently, particularly considering the co-existence and composition of multiple nutrients. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Numerical simulation of hybrid composite tubes under oblique compression by Ismail, Al Emran, Nezere, N.

    Published 2017
    “…Generally, empty metallic tubes are used, and it is found that the energy absorption capability is lower than the energy obtained using composite materials. …”
    Get full text
    Get full text
    Get full text
    Article