Search Results - (( programming using partial algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- partial algorithm »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
7
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
8
Partial Newton methods for a system of equations
Published 2013“…This approach is inspired by the Simplex Algorithm in Linear Programming. As expected the partial Newton iterations are found not to have the fast convergence properties of the full Newton method. …”
Get full text
Get full text
Get full text
Article -
9
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
10
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…Since programming is not very exact and can be considered partially art then the Genetic Algorithm is not designed to be fully autonomous and programmers hand still have to be there, but with much reduced work.…”
Get full text
Get full text
Research Report -
11
Partial Least Squares (PLS) Integrated Fourier Transform Infrared (FTIR) Approach for Prediction of Moisture in Transformer Oil and Lubricating Oil
Published 2019“…+is program can be used for prediction of other substances given that the marker region is identified. …”
Get full text
Get full text
Get full text
Article -
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
13
Mould Filling In Electronic Packaging
Published 2005“…The velocity field obtained from CBS method is thus used in pseudo-concentration algorithm, which uses the VOF technique to track the fluid front for each time step. …”
Get full text
Get full text
Monograph -
14
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Analytical model for partially prestressed concrete beam-column elements
Published 2017“…In order to validate the developed analytical model, plasticity formulation and the developed FE computer program code, five conventional RC and PPC beams and frames were fabricated and tested experimentally for cyclic load using dynamic actuator. …”
Get full text
Get full text
Get full text
Thesis -
16
Implementing a novel hybrid maximum power point tracking technique in DSP via Simulink/MATLAB under partially shaded conditions
Published 2016“…Thus, after recognizing the possible location of the GMPP, the modified P&O can be used to obtain the GMPP. The simulation and experimental implementations for the proposed algorithm are performed with different scenarios of shadowing under different irradiations, which clearly indicate that the proposed method is robust and has a fast tracking speed. …”
Get full text
Get full text
Get full text
Article -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Partial least squares integrated national water quality standards (NWQS) for indexing of water quality from industrial effluent
Published 2015“…Further indexing with PLS-WQI using the algorithm programmed in Matlab R2009b which allows for the consideration of only parameters that impart the greatest influence on water quality has resulted in a better presentation of the actual water quality at each station. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Grid portal technology for web based education of parallel computing courses, applications and researches
Published 2009“…The accessible and maintainable characteristics of the web-based service provided are important in providing online solvers service for education in PDE field. C Programming, PVM, MPI and Matlab Distributed Simulation are used to fabricate the system.…”
Get full text
Get full text
Conference or Workshop Item
