Search Results - (( java application system algorithm ) OR ( parameter reduction learning algorithm ))
Search alternatives:
- reduction learning »
- learning algorithm »
- java application »
- system algorithm »
- parameter »
-
1
-
2
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
3
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40…”
Get full text
Get full text
Get full text
Article -
4
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
5
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2022“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
6
Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction
Published 2023“…The best accuracy result of 99.97% is obtained when the model operates in a hybrid mode based on a combination of PCA, LDA and RF algorithms, and the data reduction parameter equals 40.…”
Get full text
Get full text
Get full text
Article -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
-
9
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
-
12
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Hence, the algorithm must overcome the problem of dynamic updates in the internal parameters or counter the concept drift. …”
Get full text
Get full text
Thesis -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
-
17
Characterisation of pineapple cultivars under different storage conditions using infrared thermal imaging coupled with machine learning algorithms
Published 2022“…Several types of machine learning algorithms were compared, including linear discriminant analysis, quadratic discriminant analysis, support vector machine, k-nearest neighbour, decision tree, and naïve Bayes, to obtain the best performance for the classification of pineapple cultivars. …”
Get full text
Get full text
Article -
18
An observation of different clustering algorithms and clustering evaluation criteria for a feature selection based on linear discriminant analysis
Published 2022“…However, different clustering algorithms have different parameters that need to be specified. …”
Get full text
Get full text
Get full text
Book Chapter -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
20
Chiller energy prediction in commercial building : A metaheuristic-enhanced deep learning approach
Published 2024“…Drawing on a diverse dataset from a commercial building, encompassing vital input parameters such as Chilled Water Rate, Building Load, Cooling Water Temperature, Humidity, and Dew Point, the study conducts a comprehensive comparison of metaheuristic algorithms (Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Barnacles Mating Optimizer (BMO), Harmony Search Algorithm (HSA), Differential Evolution (DE), Ant Colony Optimization (ACO), and the latest RIME algorithm). …”
Get full text
Get full text
Get full text
Get full text
Article
