Search Results - (( outsiders evaluation method algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- outsiders evaluation »
- evaluation method »
- method algorithm »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
Get full text
Get full text
Get full text
Article -
3
Interpolation and Extrapolation Techniques Based Neural Network in Estimating the Missing Ionospheric TEC Data
Published 2024Proceedings Paper -
4
Interpolation and extrapolation techniques based Neural Network in estimating the missing ionospheric TEC data
Published 2024“…Normalized RMSE, RMSE and relative correction are computed for both methods to evaluate the capability of NN to interpolate and extrapolate the missing data. …”
Conference Paper -
5
A novel method for vegetation encroachment monitoring of transmission lines using a single 2D camera
Published 2015“…excess vegetation encroachments within and outside ROWs. The performance evaluation of a real time developed test-bed scenario proves the feasibilities of integrating the method for transmission line maintenance.…”
Get full text
Get full text
Article -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Industrial datasets with ICS testbed and attack detection using machine learning techniques
Published 2021“…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model
Published 2023“…The evaluation is carried out based on multiple electric vehicles (EV) drive cycles with different Li-ion cells chemistry at varying ambient temperatures. …”
text::Thesis
