Search Results - (( programming probability function algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- programming probability »
- probability function »
- function algorithm »
- data detection »
- java »
-
1
-
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
5
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021Get full text
Get full text
Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
Get full text
Get full text
Article -
9
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The demands in SIRP are modeled by some probability functions and due to the stochastic nature of customer demands, the service levels constraint where it limits the stock out probability at each customer and the probability of overfilling the stock of each customer is introduced in this study. …”
Get full text
Get full text
Get full text
Thesis -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017Get full text
Get full text
Thesis -
13
Enhancing Power System Resilience Through Evolutionary Programming for High Impact Low Probability Events
Published 2025“…This paper presents enhancing power system resilience through evolutionary programming for high-impact low probability (HILP) events. …”
Conference paper -
14
-
15
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
16
Comparative analysis of web-based programs for single amino acid substitutions in proteins
Published 2022“…In recent years, developments in existing programs and the introduction of new prediction algorithms have transformed the state-of-the-art protein mutation analysis. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Car recognition using Bayes Classifier / Nur Atiqah Mat Samadi
Published 2017Get full text
Get full text
Thesis -
18
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
Get full text
Get full text
Monograph -
19
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
20
Optimal assignments of versions to processors in fault-tolerant computer systems
Published 1988“…For voting system, k must be at least 2 and, in this case the objective function is non-linear. This implies that linear assignment algorithms cannot be used to obtain the optimal assignment. …”
Get full text
Get full text
Article
