Search Results - (( software selection detection algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- selection detection »
- learning algorithm »
- java application »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…To achieve such goal, this research modifies and improves the Reduction with Selective Redundancy (RSR) algorithm. In the modify algorithm, test cases would be selected according to the branch coverage if they covered different branch combination. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
9
Comparison on machine learning algorithm to fast detection of malicious web pages
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases
Published 2015“…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
Get full text
Get full text
Get full text
Article -
11
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020Get full text
Get full text
Get full text
Article -
15
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Three types of March algorithms which are March 17N, March 12N and MarchPS 23N are selected to validate the tool in term of their compatibility for NPSF detection and diagnosis.Suitable data background is identified and a test procedure is developed for each algorithm. …”
Get full text
Get full text
Thesis -
16
Maldroid- attribute selection analysis for malware classification
Published 2019Get full text
Get full text
Get full text
Article -
17
Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing
Published 2019“…Comparative study has been done between different string distance measures and prioritization algorithms to select the best techniques for similarity-based test case prioritization. …”
Get full text
Get full text
Get full text
Article -
18
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…A relatively simple strategy employed by the proposed tools thus far is the observe-select-execute approach, where all of a GUI’s actions on its current state are observed, one action is selected, and the selected action is executed on the software. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
