Search Results - (( using processing data algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- using processing »
- data algorithm »
- data detection »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
3
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…In conclusion, diabetic ketoacidosis in unrestricted food intake conditions can be predicted using the proposed ANFIS and GA-ANFIS model. Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
10
Mapreduce algorithm for weather dataset
Published 2017“…In addition, these characteristics also contribute to the complexity on the data processing and prediction. Big Data analytics is a new concept to process the Big Data. …”
Get full text
Get full text
Thesis -
11
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
Get full text
Get full text
Get full text
Article -
12
An efficient parallel clustering algorithm on big data using Spark
Published 2022“…Here we are proposing a new parallel fuzzy clustering algorithm called "An efficient parallel clustering algorithm on big data using spark" which deals with real-time processing. …”
Get full text
Get full text
Get full text
Article -
13
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
14
MapReduce algorithm for weather dataset
Published 2018“…In addition, these characteristics also contribute to the complexity on the data processing and prediction. Big Data analytics is a new concept to process the Big Data. …”
Get full text
Get full text
Research Report -
15
Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data
Published 2025“…Deep learning algorithms were widely used among all the data-driven algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…Problem of the size of data happen when data cannot be process because of it too complex. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
17
Optimized clustering with modified K-means algorithm
Published 2021“…huge data is a big challenge. Clustering technique is able to find hidden patterns and to extract useful information from huge data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…We found that PSO algorithm reveals better performance than Ward’s algorithm on continuous data format; however for binary data format, Ward’s algorithm outperforms arrogantly.…”
Get full text
Get full text
Get full text
Thesis -
19
Enhanced kiosks mapping on traditional market using Apriori Algorithm / Ardiansyah Dores, and Tazkiyah Herdi
Published 2021“…The algorithm used here is a priori algorithm, the data used are questionnaire data from 250 respondents, from the data taken 120 data used as training data, for the process of making data models. …”
Get full text
Get full text
Book Section -
20
Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm
Published 2021“…In data preprocessing, a clean and useful data is produced and become as an input for association analysis process. …”
Get full text
Get full text
Get full text
Get full text
Thesis
