Search Results - (( java implication based algorithm ) OR ( learner generated detection algorithm ))
Search alternatives:
-
1
Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization
Published 2014“…The results of the experiments show that the proposed combined technique has remarkable benefits over the detection using only supervised or unsupervised learners.…”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization
Published 2015“…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…In future, this research can be an initial work in automating tutorial decisions in an intelligent tutoring system which are able to adapt to the behaviour of the learners based on the detected mental states. Therefore, more relevant information about the students can be provided to the schools and teachers in order to increase the learning impacts.…”
Get full text
Get full text
Thesis -
4
A multi-nets ANN model for real-time performance-based automatic fault diagnosis of industrial gas turbine engines
Published 2017“…The ability of all the trained networks of the multi-nets model to detect these faulty conditions was investigated. The results obtained showed that among the four trained networks in the multi-nets model, the associated network for gas generator rotational speed was able to track these incidents earlier. …”
Get full text
Get full text
Article -
5
-
6
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
7
A review on security and privacy issues in E-learning and the MapReduce aproach
Published 2019“…Therefore, the actions against security incidents increased since network-connected devices. Log files are generated at every level of the computing infrastructure and represent a valuable source of information in detecting attacks. …”
Get full text
Get full text
Get full text
Article
