Search Results - (( rating system method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- method algorithm »
- java application »
- rating system »
- system method »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…After the system training, the testing part for face recognition is conducted. …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
-
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. …”
Get full text
Get full text
Thesis -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The performance of the proposed method and other existing techniques (Genetic Algorithm, Artificial Immune System and Immune-Genetic Algorithm) were analysed to evaluate and determine its efficiency in terms of maximum intrusion detection rate and the highest true positive rate. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…The HFPSO technique hybridizes the Firefly Optimization (FFO) algorithm and the Particle Swarm Optimization (PSO) method to improve the exploitation and exploration strategies and enhance the convergence rate. …”
Get full text
Get full text
Thesis -
15
Machine learning algorithms in context of intrusion detection
Published 2016“…The result shows that not a single algorithm has a high detection rate for each class of KDD99 dataset. …”
Get full text
Get full text
Conference or Workshop Item -
16
A study on advanced statistical analysis for network anomaly detection
Published 2005“…This research investigated a discriminant analysis method for detecting intrusions based on number of system calls during an activity on host machine. …”
Get full text
Monograph -
17
On the combination of adaptive neuro-fuzzy inference system and deep residual network for improving detection rates on intrusion detection
Published 2022“…To alleviate this problem, we proposed a method that combines the Adaptive Neuro-fuzzy Inference System (ANFIS) and the ResNet algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
SVD-gorank: Recommender system algorithm using SVD and gower's ranking
Published 2025“…The problem is that this algorithm is limited to only the rating weights used. …”
Get full text
Get full text
Get full text
Article -
19
Automated plant recognition system based on multi-objective parallel genetic algorithm and neural network
Published 2014“…The problem with the existing plant recognition system is the lack of method to find the best structure for their classifiers. …”
Get full text
Get full text
Thesis -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
