Search Results - (( network solution mining algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- network solution »
- mining algorithm »
- java application »
- solution mining »
-
1
-
2
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Orange is a tool that being used in implementing K-Means Clustering Algorithm that could be seen as the most suitable solution to find a network trend pattern of user accessing the Internet and to produce with profiling network. …”
Get full text
Get full text
Thesis -
3
-
4
A comprehensive analysis of blockchain-based cryptocurrency mining impact on energy consumption
Published 2022“…The Proof-of-Work (PoW) algorithm is used for mining ‘Bitcoin’ which is consumed enormous computational power. …”
Get full text
Get full text
Get full text
Article -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…Immune based algorithm is part of bio-inspired algorithms elicits theories which can act as an inspiration for computer-based solutions. …”
Get full text
Get full text
Research Reports -
7
Synergizing intelligence and knowledge discovery: Hybrid black hole algorithm for optimizing discrete Hopfield neural network with negative based systematic satisfiability
Published 2024“…This ensured that the optimized states achieved maximum diversity and reach global minima solutions with the lowest similarity index, thereby enhancing the overall performance of the network. …”
Get full text
Get full text
Get full text
Article -
8
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Though, numerous studies have contributed in various ways to improve the utilization of data mining for IDS, effective solution often depends on the network setting where the IDS is deployed. …”
Get full text
Get full text
Article -
9
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Though, numerous studies have contributed in various ways to improve the utilization of data mining for IDS, effective solution often depends on the network setting where the IDS is deployed. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…This work proposed a new hybridised network of 3-Satisfiability structures that widens the search space and improves the effectiveness of the Hopfield network by utilising fuzzy logic and a metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
12
A hybrid local search algorithm for minimum dominating set problems
Published 2022“…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
Get full text
Get full text
Article -
13
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
Get full text
Get full text
Get full text
Article -
14
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
15
-
16
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
17
-
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
A framework for malware identification based on behavior
Published 2012“…For malware prediction, there are four areas of malware features which are i) process, ii) file, iii) registry, and iv) network activities. The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. …”
Get full text
Get full text
Thesis -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
