Search Results - (( programming using random algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- random algorithm »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…The way to solve this problem, we applied the existed method in visual C++ programming with used the Random midpoint Displacement (RMD) algorithm. …”
Get full text
Get full text
Student Project -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Security analysis of blowfish algorithm
Published 2013“…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
Get full text
Get full text
Conference or Workshop Item -
7
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
11
-
12
A random search based effective algorithm for pairwise test data generation
Published 2011“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
14
-
15
Automated path testing using the negative selection algorithm
Published 2017“…The proposed algorithm has been applied to the most commonly used benchmarking program which is triangle classifier. …”
Get full text
Get full text
Indexed Article -
16
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
17
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
Published 2018“…Software programs of these ciphers and NIST (SP 800-22) tests adopted to assess the randomness properties. …”
Get full text
Get full text
Get full text
Article -
18
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…Using a different initial point, all of them produced the correct results …”
Get full text
Get full text
Article -
19
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
20
