Search Results - (( programming using context algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
    Get full text
    Get full text
    Article
  10. 10

    Enhancing understanding of programming concepts through physical games by Raja Yusof, Raja Jamilah, Habib, Ahsan

    Published 2017
    “…The activities were conducted involving first and fourth year undergraduate students and Master students in Programming 1 (31 students), Data Structure (6 students), Analysis of Algorithm (12 students) and Advanced Algorithm (22 students) courses respectively. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Comparative Analysis Using Bayesian Approach To Neural Network Of Translational Initiation Sites In Alternative Polymorphic Contex by Herman, Nanna Suryana, Husin, Nurul Arneida, Hussin, Burairah

    Published 2012
    “…Widely accepted as an important signal for gene discovery,translation initiation sites (TIS) in weak context has been the main focus in this paper.Many TIS prediction programs have been developed for optimal context,but they fail to successfully predict the start codon if the contexts conditions are in weak positions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…In the context of automatic NC program production, the optimization of the cutting tool’s travel path could be achieved by integrating the ACO algorithm and the Open Architecture Control (OAC) into commercial CAD/CAM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change by Nurul Nadrah Aqilah, Tukimat

    Published 2014
    “…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of hashed cryptography algorithm based on cryptography message syntax by Ali, Mohammed Ahnaf

    Published 2019
    “…This design and simulation research is conducted in CMC network security (message encryption context). The design will use MATLAB encryption to show simulation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a novel natural frequencies prediction tool for laminated composite plates using integrated artificial neural network (ANN) - simulink MATLAB / Mohd Arif Mat Norman by Mat Norman, Mohd Arif

    Published 2024
    “…The prediction tool utilises an Artificial Neural Network (ANN) with a two-layer feed-forward algorithm and ten hidden layers, using Levenberg-Marquardt as the training algorithm. …”
    Get full text
    Get full text
    Thesis