Search Results - (( java pattern classification algorithm ) OR ( using code replication algorithm ))
Search alternatives:
- pattern classification »
- replication algorithm »
- code replication »
- using code »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
Published 2025“…It is imperative to employ resilient QR code algorithms to guarantee the security of QR code applications in response to this challenge. …”
Get full text
Get full text
Get full text
Article -
4
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
5
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
Published 2024Get full text
journal::journal article -
6
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…This study applies machine learning techniques using the WEKA analytical tool to explore, cluster and classify servicing code applications using a dataset gathered from multiple faculties, and campuses within the Faculty of Business and Management in a selected public university in Malaysia. …”
Get full text
Get full text
Get full text
Article -
7
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
thesis::doctoral thesis
