Search Results - (( websites optimization based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- websites »
-
1
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
2
Fuzzy modelling using butterfly optimization algorithm for phishing detection
Published 2020“…To generate the fuzzy parameter automatically, an optimization method is required and Butterfly Optimization Algorithm (BOA) is one of the good methods to be applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
Published 2021“…The optimization method derives from the metaheuristic algorithm. …”
Get full text
Get full text
Article -
4
GA optimization-based BRB AI reasoning algorithm for determining the factors affecting customer churn for operators
Published 2024“…Therefore, in this paper, a belief rule base (BRB) artificial intelligence inference algorithm based on GA optimization to determine the factors affecting customer churn for operators proposed. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…However, their performances are not well optimized. This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. …”
Get full text
Get full text
Get full text
Article -
7
Hybridizing harmony search with local search based metaheuristic for solving curriculum based university course timetabling / Juliana Wahid
Published 2017“…Harmony search algorithm (HSA) is a population-based metaheuristic optimization algorithm that imitates the music improvisation process where musicians improvise their instruments’ pitch by searching for a perfect state of harmony. …”
Get full text
Get full text
Thesis -
8
Optimized Decision Forest for Website Phishing Detection
Published 2021“…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article -
9
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
10
Development of IoT-based automated dynamic emergency response system against fire incidents in academic building
Published 2023“…This study aims to address the need for improved firefighting systems in academic building by proposing the development of an IoT-based automated emergency response website. The proposed system leverages IoT technology, wireless and bluetooth sensor networks to gather real-time data from various sensors and devices installed in the site and uses machine learning algorithms to predict and prevent potential fire incidents. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Malay cuisine cooking recipe recommendation system using Genetic Algorithm (GA) / Nur Nazihah Ismail
Published 2017“…For this recommendation system, Genetic Algorithm (GA) is used as a technique to find the optimal results. …”
Get full text
Get full text
Student Project -
12
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
14
Parallelizing web scraping to improve performance and scalability
Published 2023“…Web scraping is the process of extracting data from websites, usually for analysis or other purposes. Web scraping is increasingly important in e-commerce because it enables businesses to extract valuable data from competitors' websites, especially product prices. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…From news classification and news sentiment, a rule-based algorithm was used to predict the stock market turning points. …”
Get full text
Get full text
Book Section -
16
Schedule of tour guide using genetic algorithm / Nur Aishah Rosli
Published 2017Get full text
Get full text
Thesis -
17
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
A New Model for Trojan Detection using Machine Learning Inspired by Al-Furqan Verse
Published 2024“…Moreover, the knowledge discovery techniques (KDD) and the data mining algorithm were used to optimize the accuracy result. …”
Article
