Search Results - (( java implementation among algorithm ) OR ( program attack learning algorithm ))
Search alternatives:
- implementation among »
- java implementation »
- learning algorithm »
- among algorithm »
- program attack »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
6
-
7
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…The SVM algorithm, a supervised learning model, plays a crucial role in improving the efficiency of tool selection, ultimately enhancing the speed and adaptability of vulnerability detection processes. …”
Get full text
Get full text
Get full text
Article -
8
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…This is according to the syntax algorithm. One of the two messages is deliberately rearranging and attacking by malicious. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
10
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…In this model, the static and dynamic analyses were conducted and the machine learning algorithms were applied to optimize the performance. …”
Proceedings Paper -
11
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
12
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
13
-
14
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…To this goal, a variety of machine learning algorithms are being studied. Data protection and monitoring is also another concern that is a critical component of the organization. …”
Get full text
Get full text
Article -
16
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The main keys of the new classifier are based on the new kernel method, new learning metric and a new optimization algorithm in order to optimize the SVM decision function. …”
Get full text
Get full text
Get full text
Thesis -
17
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
text::Thesis -
18
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…MapReduce is a promising parallel programming model for processing large data. Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
Get full text
Get full text
Get full text
Article -
19
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
20
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…Many algorithms have been implemented to solve the grid scheduling problem. …”
Get full text
Get full text
Get full text
Thesis
