Search Results - (( java detection model algorithm ) OR ( program normalization techniques algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Solving non-convex economic dispatch problem using computational intelligence technique by Mansor M.H., Othman M.M., Musirin I., Saleh S.A.M.

    Published 2023
    “…Computer programming; Immune system; Scheduling; Artificial Immune System; Computational intelligence techniques; Economic Dispatch; Evolutionary programming algorithms; Log-normal; Non-convex economic dispatches; Reliability test system; Valve-point loading effect; Electric load dispatching…”
    Conference Paper
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Immune Log-Normal Evolutionary Programming (ILNEP) for solving economic dispatch problem with prohibited operating zones by Mansor M.H., Musirin I., Othman M.M.

    Published 2023
    “…Computer programming; Electric power system planning; Electric power systems; Evolutionary algorithms; Immune system; Problem solving; Scheduling; Artificial Immune System; Economic Dispatch; Economic dispatch problems; Electrical power system; Log-normal; Optimization techniques; Prohibited operating zone; Reliability test system; Electric load dispatching…”
    Conference Paper
  8. 8

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Multi -Objective Economic Dispatch Using Evolutionary Programming by Noor Azlan Bin Adnan

    Published 2023
    “…This study focused on solving multi-objectives economic dispatch using Heuristic Optimization (HO) technique which is Multi-Objective Evolutionary Programming (MOEP). …”
  11. 11

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design Optimization of 3-Phase Rectifier Power Transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, Md Hasan, Khairul Nisak

    Published 2008
    “…Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Citation Index Journal
  13. 13
  14. 14

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Design Optimization of 3-phase rectifier power transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, K.N., Mohd Hassan

    Published 2008
    “…Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Citation Index Journal
  16. 16
  17. 17
  18. 18

    Optimal Reactive Power Dispatch for Voltage Stability Improvement Considering Line Contingencies using PSO by Nor Rul Hasma, Abdullah, I., Musirin

    Published 2013
    “…The simulations results are compared with those obtained from the Evolutionary Programming (EP) technique in the attempt to highlight its merit. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Design Optimization of 3-phase rectifier power transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, K.N., Mohd Hassan

    Published 2008
    “…Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Conference or Workshop Item