Search Results - (( variables location function algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- variables location »
- function algorithm »
- location function »
- method algorithm »
- java detection »
-
1
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
4
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In comparison to different single algorithms for feature selection,experimental results show that the proposed ensemble method is able to reduce dimensionality, the number of irrelevant features and produce reasonable classifier accuracy. …”
Get full text
Get full text
Thesis -
6
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Global Algorithms for Nonlinear Discrete Optimization and Discrete-Valued Optimal Control Problems
Published 2009“…Conventional computational optimal control techniques are designed for problems in which the control takes values in a connected set, such as an interval, and thus they cannot solve the problem directly. Furthermore, variable switching times are known to cause problems in the implementation of any numerical algorithm due to the variable location of discontinuities in the dynamics. …”
Get full text
Get full text
Get full text
Thesis -
10
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…In this research, an approach has been proposed that explores the combination of genetic algorithms with static analysis, and a code replacement method to address the problem of XSS at the source code level. …”
Get full text
Get full text
Thesis -
12
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…FD-TMS was comprehensively assessed in a simulation environment utilizing a performance analysis tool constructed on Java. The results were compared to the baseline algorithm, highlighting key parameters like false alarms and event detection accuracy. …”
Get full text
Get full text
Article -
13
Forecasting hydrological parameters for reservoir system utilizing artificial intelligent models and exploring their influence on operation performance
Published 2019“…The three different optimization algorithms used in this study are the genetic algorithm (GA), particle swarm optimization (PSO) algorithm and shark machine learning algorithm (SMLA). …”
Get full text
Get full text
Article -
14
Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi ... [et al.]
Published 2023“…Fuzzy Queuing Model for the a-cut technique is based on the Dong, Shah, and Wong (DSW) algorithm. In a multi-server fuzzy queuing model, the approximate technique DSW algorithm is employed to describe a membership function regarding the performance measures (Thamotharan,2016). …”
Get full text
Get full text
Article -
15
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…On another note, the drawback in CS is in locating the most stable conformation of a molecule with the minimum potential energy based on a mathematical function. …”
Get full text
Get full text
Thesis -
16
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017“…In this paper, we introduce a mobile based computer vision algorithm for automatic bacteria colony counting using morphological operations and transforms in image processing, on a custom Android mobile cross-platform open source software and written in Java, C++ and Open CV computer vision library. …”
Get full text
Get full text
Get full text
Article -
17
Fuzzy subtractive clustering (FSC) with exponential membership function for heart failure disease clustering
Published 2022“…Objective: Fuzzy clustering algorithm is a partition method used to assign objects from a data set to a cluster by marking the average location. …”
Get full text
Get full text
Article -
18
Optimal planning of energy storage system for hybrid power system considering multi correlated input stochastic variables
Published 2025“…The IEEE 118-bus system is adopted as the large-scale testing system to assess the performance of the proposed methodology and the convergence capability of the hybrid algorithm in rejecting the disturbances in the system caused by the existence of 132 different input correlated stochastic variables. …”
Article -
19
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…There are two strategies that have been implemented in the numerical solutions which are the variable step size and the variable step size and variable order. …”
Get full text
Get full text
Thesis -
20
Comparison between Newton’s Method and a new Scaling Newton Method / Ramizah Baharuddin
Published 2021“…Newton's Method also called the Newton-Raphson method is a recursive algorithm for approximating the root of a differentiable function. …”
Get full text
Get full text
Thesis
