Search Results - (( java implication force algorithm ) OR ( process _ prevention algorithm ))
Search alternatives:
- prevention algorithm »
- implication force »
- java implication »
- force algorithm »
-
1
Enhancement of stemming process for malay illicit web content
Published 2012“…To date, the existing stemming algorithm in Malay language; Othman’s stemming algorithm and Sembok’s stemming algorithm still produce errors in the result. …”
Get full text
Get full text
Thesis -
2
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…In this thesis, we investigate the possibility of adapting an intelligent system to an Intrusion Detection System (IDS) by proposing a cooperative and intelligent detection and prevention system using machine learning approaches, and aim to facilitate the detection and prevention process in a distributed environment. …”
Get full text
Get full text
Thesis -
3
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Algorithm for the legal regulation of internet financial crime
Published 2024“…Data processing for criminal acts on Internet finance platforms is crucial, with the utilization of random forest algorithms, including Decision tree and Bagging integration algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Development of a new algorithm for segmentation of flotation froth images
Published 2014“…It is well known that froth visual features reflect the operating conditions of the flotation process, so that being able to accurately obtain the froth properties is the most significant criteria to optimize and control this process. …”
Get full text
Get full text
Article -
6
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. …”
Get full text
Get full text
Get full text
Article -
7
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…LMS and NLMS algorithms have been used in a wide range of signal processing applications because of their simplicity in computations compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
8
Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks
Published 2011“…The results show that the two models successfully prevent both wireless DoS and replay attacks. In addition, the newly proposed M-hmac algorithm provides better network performance in term of the metrics.…”
Get full text
Get full text
Get full text
Article -
9
A comparative analysis of machine learning algorithms for diabetes prediction
Published 2024“…The methodology involves data collection, pre-processing, and training the algorithms using k-fold cross-validation. …”
Get full text
Get full text
Get full text
Article -
10
Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip
Published 2017“…To solve this issue, an algorithm is proposed to automate the global CDN building process and at the same time obtain a balanced overall CDN not achieved by the conventional method. …”
Get full text
Get full text
Thesis -
11
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…The fuzzified dataset was applied in FID3 algorithm, which is the fuzzy version of the ID3 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Automatic control of flotation process using computer vision
Published 2015“…A marker based watershed algorithm had been adopted and improved so as to prevent the over segmentation of big bubbles and able to adapt itself with different scenario of froth images. …”
Get full text
Get full text
Thesis -
13
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
14
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING
Published 2022“…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Improving the efficiency of clustering algorithm for duplicates detection
Published 2023“…In this paper, we propose a data pre-processing method that increases the efficiency of window algorithms in grouping similar records together. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
ASIC Layout Design-Space Exploration of Pan-and-Tompkins Pre-Processing Algorithm for High Efficiency Electrocardiogram Monitor
Published 2020“…Moreover, long hour ECG monitoring requires an efficient architecture to support real-time processing and low power consumption. This paper presents an application specific integrated circuit (ASIC) design of Pan-and-Tompkins ECG pre-processing algorithm which aims to remove several unwanted noise to increase analysis accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is observed that in 67% of studied cases, inflation rate can strengthen cell load variation. To prevent this event a new method is proposed using the statistical process control terms (SPC) which prevent allocating each machine type more than a dynamic upper limit of average of a machine type inside a cell. …”
Get full text
Get full text
Thesis -
19
Integration of spectroscopy and chemometric analysis for food authentication: a review
Published 2025“…The high demand in the food sector necessitates an authentication process to verify products and prevent food fraud. …”
Get full text
Get full text
Get full text
Article -
20
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article
