Search Results - (( variable evaluation using algorithm ) OR ( java data detection algorithm ))
Search alternatives:
- evaluation using »
- using algorithm »
- data detection »
- variable »
- java »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
Get full text
Get full text
Article -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. The threshold calculation is based on the video selected. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Classification for large number of variables with two imbalanced groups
Published 2020“…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
10
Performance evaluation of vector evaluated gravitational search algorithm II
Published 2014“…The VEGSAII algorithm uses a number of populations of particles. …”
Get full text
Get full text
Conference or Workshop Item -
11
Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems
Published 2012“…The proposed algorithm, which is called Vector Evaluated Gravitational Search Algorithm (VEGSA), uses a number of populations of particles. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Electricity demand forecasting in Turkey and Indonesia using linear and nonlinear models based on real-value genetic algorithm and extended Nelder-Mead local search
Published 2014“…The second problem is the use of a single algorithm that failed to solve local optima. …”
Get full text
Get full text
Get full text
Thesis -
13
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
14
-
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
Get full text
Get full text
Get full text
Article -
16
Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions
Published 2014“…The VEGSA algorithms use a number of populations of particles. …”
Get full text
Get full text
Get full text
Article -
17
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…The evaluation showed the overall superiority of VLBHO over the other algorithms in terms of accomplishing lower fitness values when optimizing mathematical functions of the variable length type.…”
Get full text
Get full text
Get full text
Article -
18
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…The evaluation showed the overall superiority of VLBHO over the other algorithms in terms of accomplishing lower fitness values when optimizing mathematical functions of the variable length type.…”
Get full text
Get full text
Get full text
Article -
19
Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data
Published 2023“…The evaluation showed the overall superiority of VLBHO over the other algorithms in terms of accomplishing lower fitness values when optimizing mathematical functions of the variable length type.…”
Get full text
Get full text
Get full text
Article -
20
