Search Results - (( parametric classifications _ algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- parametric classifications »
- data detection »
- java »
-
1
-
2
Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification
Published 2020“…The overall objective of this study is to explore some factors affecting non- parametric LCM classification techniques in terms of accuracy assessment and to compare their performance with a well-established classification technique by implementing Landsat 8 and Sentinel satellites. …”
Get full text
Get full text
Thesis -
3
Nearest neighbour group-based classification
Published 2010“…In this paper, we extend three variants of the nearest neighbour algorithm to develop a number of non-parametric group-based classification techniques. …”
Get full text
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
5
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…In this study, we evaluated the performance of the enhanced algorithm called dendrite cell algorithm using sensitivity, specificity, false positive rate, and accuracy and validated the result using parametric and non parametric statistical significant tests. …”
Get full text
Get full text
Get full text
Article -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
Application of Decision Trees in Athlete Selection: A Cart Algorithm Approach
Published 2023“…The focus of this study is on the use of DTs, employing the Classification and Regression Trees (CART) algorithm, in the initial screening of athletes. …”
Get full text
Get full text
Get full text
Article -
12
Generalized derivations and automorphisms of some classes of algebras
Published 2019“…In the Leibniz algebra case, we had eight subspaces too, with different structures, it includes two one-parametric sets as well. Furthermore, by using the two one-parametric sets, two invariant functions are de- fined. …”
Get full text
Get full text
Thesis -
13
Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques
Published 2022“…This method classifies a population into branch-like segments that construct an inverted tree with a root node, internal nodes, and leaf nodes. The algorithm is non-parametric and can efficiently deal with large, complicated datasets without imposing a complicated parametric structure. …”
Get full text
Get full text
Get full text
Article -
14
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…The experimental results are also thoroughly evaluated and verified via non-parametric statistical analysis. Based on the obtained experimental results, the OGC, DPSO, and VDEO frameworks achieved an average enhancement up to 24.36%, 9.38%, and 11.98% of classification accuracy, respectively. …”
Get full text
Get full text
Thesis -
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
16
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…It is a well-established fact that machine learning is outperforming in terms of prediction and classification. Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
Get full text
Get full text
Thesis -
17
Novel voice activity detection based on cepstrum moments
Published 2010“…In this paper we propose a novel statistical VAD algorithm using Cepstrum coefficients and their moments as features for classification. …”
Get full text
Get full text
Conference or Workshop Item -
18
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
19
Image Splicing Detection With Constrained Convolutional Neural Network
Published 2019“…It is shown that CNN with constrained convolution algorithm can be used as a general image splicing detection task.…”
Get full text
Get full text
Thesis -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article
