Search Results - (( policy implementation using algorithm ) OR ( java features detection algorithm ))
Search alternatives:
- policy implementation »
- implementation using »
- features detection »
- using algorithm »
- java features »
-
1
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
7
-
8
Smart student timetable planner
Published 2025“…The project scope encompasses features such as secure login, course selection with conflict detection, timetable history, comparison between auto-generated and manual schedules, collaboration modules, and export functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…The existing cache replacement (i.e. least recently used (LRU)) algorithm depends on usage of the data being referenced. …”
Get full text
Get full text
Thesis -
10
A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation
Published 2019“…In addition, two different optimization algorithms, namely crow search algorithm and master–slave algorithm, have been introduced to generate an optimal rule for water release policy. …”
Get full text
Get full text
Article -
11
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…Meanwhile, the effect of EIARS in reducing the number of checked rules during the authorization process is evaluated using a simulation technique. The results indicate that, by implementing the UBACO, the weighted comprehensive complexity is reduced by 40.5% as compared to the UCON based policy proposed by Martinelli and Mori (2010). …”
Get full text
Get full text
Thesis -
12
Smart grid: Bio-inspired algorithms energy distributions for data centers
Published 2025“…The system is implemented and simulated using the CloudSim Plus framework under both homogeneous and heterogeneous data centre environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
14
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…Findings reveal several search strategies implemented to improve the algorithm’s performance. …”
Get full text
Get full text
Article -
15
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
16
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…Findings reveal several search strategies implemented to improve the algorithm’s performance. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
18
Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks
Published 2011“…In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The interface selection algorithm was based on NEMO implementation structure using a technique of mutihoming which was extended to MIPv6 concepts The outcome of this research work are: a designed policy protocol for policy messages communication between the Mobile Router and the Home Agent, the framework is simulated using Network Simulator (NS2) with an extension of mobiwan, the result shows the end to end delay, average end to end delay, overhead, optimal routing path, average inter-packet latency and throughput of the developed system. …”
Get full text
Get full text
Thesis -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article
