Search Results - (( variable evaluation using algorithm ) OR ( java data detection algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
    Get full text
    Get full text
    Article
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…In the video and frame selection, pre-defined video which have different type of motion and size is used for the algorithm evaluation purpose. The threshold calculation is based on the video selected. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Performance evaluation of vector evaluated gravitational search algorithm II by Muhammad, B., Ibrahim, Z., Ghazali, K.H., Ghazali, M.R., Mubin, M., Mokhtar, M.

    Published 2014
    “…The VEGSAII algorithm uses a number of populations of particles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems by Zuwairie, Ibrahim, Badaruddin, Muhammad, Kamarul Hawari, Ghazali, Lim, Kian Sheng, Sophan Wahyudi, Nawawi, Zulkifli, Md. Yusof

    Published 2012
    “…The proposed algorithm, which is called Vector Evaluated Gravitational Search Algorithm (VEGSA), uses a number of populations of particles. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…The evaluation showed the overall superiority of VLBHO over the other algorithms in terms of accomplishing lower fitness values when optimizing mathematical functions of the variable length type.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…The evaluation showed the overall superiority of VLBHO over the other algorithms in terms of accomplishing lower fitness values when optimizing mathematical functions of the variable length type.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Sara, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…The evaluation showed the overall superiority of VLBHO over the other algorithms in terms of accomplishing lower fitness values when optimizing mathematical functions of the variable length type.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20