Search Results - (( variable equalization based algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…Based on the findings, Algorithm 2 outperforms Algorithm 1 in classifying the minority group, while both proposed algorithms perform equally well in classifying the majority group. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Study of nature inspired computing (NIC) technique for optimal reactive power dispatch problems by Sulaiman, Mohd Herwan

    Published 2017
    “…ORPD problem is a nonlinear optimization problem that involving both equality constraints and inequality constraints. The proposed algorithms are tested on five different case studies which are IEEE 30-bus system with 13 control variables, IEEE 30-bus system with 19 control variables, IEEE 30-bus system with 25 control variables, IEEE 57-bus system with 25 control variables and IEEE 118-bus system with 77 control variables. …”
    Get full text
    Get full text
    Research Report
  8. 8

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  9. 9

    Multi-stage thermal-economical optimization of compact heat exchangers: A new evolutionary-based design approach for real-world problems by Yousefi, M., Darus, A.N., Yousefi, M., Hooshyar, D.

    Published 2015
    “…The complicated task of design optimization of compact heat exchangers (CHEs) have been effectively performed by using evolutionary algorithms (EAs) in the recent years. However, mainly due to difficulties of handling extra variables, the design approach has been based on constant rates of heat duty in the available literature. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Development of committee machine models for multiple response optimization problems by Golestaneh, Seyed Jafar

    Published 2014
    “…The results represent Global Desirability of proposed algorithm is equal or higher than GD of case studies. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    A novel quantum calculus-based complex least mean square algorithm (q-CLMS) by Sadiq, A., Naseem, I., Khan, S., Moinuddin, M., Togneri, R., Bennamoun, M.

    Published 2022
    “…The proposed algorithm is based on Wirtinger calculus and is called as q- Complex Least Mean Square (q-CLMS) algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    A novel quantum calculus-based complex least mean square algorithm (q-CLMS) by Sadiq, A., Naseem, I., Khan, S., Moinuddin, M., Togneri, R., Bennamoun, M.

    Published 2022
    “…The proposed algorithm is based on Wirtinger calculus and is called as q- Complex Least Mean Square (q-CLMS) algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    A novel quantum calculus-based complex least mean square algorithm (q-CLMS) by Sadiq, A., Naseem, I., Khan, S., Moinuddin, M., Togneri, R., Bennamoun, M.

    Published 2023
    “…The proposed algorithm is based on Wirtinger calculus and is called as q- Complex Least Mean Square (q-CLMS) algorithm. …”
    Get full text
    Get full text
    Article
  17. 17

    A heuristic approach for finding similarity indexes of multivariate data sets by Khan, Rahim, Zakarya, Muhammad, Khan, Ayaz Ali, Ur Rahman, Izaz, Abd Rahman, Mohd Amiruddin, Abdul Karim, Muhammad Khalis, Mustafa, Mohd Shafie

    Published 2020
    “…Experiments were conducted with both benchmark and real time MDSs for evaluating the proposed algorithm`s performance against its rival algorithms, which are traditional dynamic programming based and sequential similarity measure algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    DESIGN AND DEVELOPMENT OF HIGH-ACCURACY MACHINE FOR WIRE BENDING by Mustafa F.F., Hussein O., Fakhri O.F., Sabri A.H.

    Published 2023
    “…Ten different dimensions of an equilateral triangle design sample with ten tries for each dimension (variable flange length, fixed bending angle equals to 60 degrees and bending radius equals to 3 mm) have been selected being produced using the bending machine, and the products have been formed two times. …”
    Article
  19. 19

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Enhancing CI engine performance and emission control using a hybrid RSM–Rao algorithm for ZnO-doped castor–neem biodiesel blends by Zhu, Chao-zhe, Samuel, Olusegun D., Patel G C, Manjunath, Der, Oguzhan, Abbas, Mohamed, Hussain, Fayaz, Ting, Tin Tin

    Published 2025
    “…The performance of the Rao algorithm seems to be superior to the RSM because the deviation in Rao algorithm predictions with experimental values resulted in an absolute percent error equal to 4.63 % for BP, 3.98 % for BTE, 2.46 % for CO, 5.32 % for UHC, and 0.85 % for NOx emissions, respectively. …”
    Get full text
    Get full text
    Get full text
    Article