Search Results - (( software detection a algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- software detection »
- application mining »
- java application »
- mining algorithm »
- detection a »
- a algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Real-Time Face Detection And Tracking Using Software And Hardware Design
Published 2018“…The face location was determined by calculating the centroid of the detected region. A software version of the algorithm was independently implemented and tested in MATLAB Simulink. …”
Get full text
Get full text
Monograph -
9
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
10
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…The results show the algorithm used in this research can reduce the test suite size as well as significantly improve the fault detection effectiveness. …”
Get full text
Get full text
Thesis -
11
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper demonstrates the experimental results of Canny edge detection algorithm performance through MATLAB software by using two different input images which are an ideal image and a real image.…”
Get full text
Get full text
Final Year Project -
12
-
13
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Based on the result, we developed a prototype tool called detection on ambiguous SRS written in Malay using machine learning. …”
Get full text
Get full text
Get full text
Thesis -
14
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
Get full text
Get full text
Thesis -
16
Norms detection and assimilation in multi-agent systems: A conceptual approach
Published 2023“…In this paper, we propose a technique for a software agent to detect the norms of a community of agents and assimilate its behavior to comply with the local normative protocol, failing which, the agent is refused services and resources. …”
Conference paper -
17
Improving The Algorithm To Detect Internet Worms
Published 2008Get full text
Get full text
Get full text
Thesis -
18
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…In my final year project, the purpose of project is reconstruct the I/V converter by using op-amp chip other than LM741 and the algorithm for detect location of photodiode is implement by LabVIEW software. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
