Search Results - (( users selection based algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- learning algorithm »
- java application »
- users selection »
- selection based »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
2
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
5
Tourist Trip Design Problem with user preference and popularity: a case study of Langkawi Island / Nabilah Anuar Ahmad and Huda Zuhrah Ab. Halim
Published 2023“…The algorithm will choose POIs based on categories selected by the users. …”
Get full text
Get full text
Book Section -
6
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
Get full text
Get full text
Thesis -
7
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…A new model in news selection is proposed based on sub-modularity model. …”
Get full text
Get full text
Thesis -
8
-
9
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
Get full text
Get full text
Thesis -
10
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A new case is retained in the case base for future retrievals. A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
Conference paper -
11
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
13
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system enables the logistic company to arrange its route to deliver based on the number of trucks selected by the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
Get full text
Get full text
Get full text
Article -
15
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach
Published 2020“…Replica selection in data grids aims to select the best replica location based on the quality-of-service parameters preferred by the user. …”
Get full text
Get full text
Article -
16
-
17
Mobile user location prediction: genetic algorithm-based approach
Published 2010“…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
Get full text
Get full text
Get full text
Article -
20
Hybrid LTE-Vanets Based Optimal Radio Access Selection
Published 2018“…The periodically broadcasted network information supports mobile users to make their selection decisions;mobiles consider their own individual preferences,cost and partial QoS information signaled by the network while making their decision.The switches algorithm between VANET and LTE based on the load value of network and quality of service requirements were proposed.The simulation results have shown that the proposed algorithm has better performance compared with LTE and VANETs separately in terms of packet delivery ratio,latency and application-level throughput. …”
Get full text
Get full text
Get full text
Get full text
Article
