Search Results - (( java application using algorithm ) OR ( features position based algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Genetic algorithm based ensemble framework for sentiment analysis by Lai, Po Hung

    Published 2018
    “…Phrase based features generally performed better, however the feature sets they produce are much larger than word based but this is where feature selection is helpful. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach by Thabet, Eman, Khalid, Fatimah, Sulaiman, Puteri Suhaiza, Yaakob, Razali

    Published 2020
    “…The presented algorithm proposes local features fusion based on Gabor-Canny- Hog features embedded an updated compact covariance matrix technique as sophisticated feature-based tracking, utilizing video sequences of IBGHT dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparison of Naïve bayes classifier with back propagation neural network classifier based on f - folds feature extraction algorithm for ball bearing fault diagnostic system by Osman Mohamed Addin, Addin, Salit, Mohd Sapuan, Othman, Mohamed, Ahmed Ali, Basheer Ahmed

    Published 2011
    “…This paper is intended to compare the Naïve bayes classifier for ball bearing fault diagnostic system with the back propagation neural network based on the f-folds feature extraction algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…Using a number of candidate detectors from an improved Apriori Algorithm with Particle Swarm Optimization, the true positive rate of detecting malicious code is maximized, while the false positive rate of wrongful detection is minimized. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…First, the algorithm will detect a human face and irises. Second, the mouth region is estimated by using geometric calculation based on the irises positions. …”
    Get full text
    Thesis
  9. 9

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. In addition, experiments prove that the enhanced algorithm shows a higher performance through lower false positive, higher accuracy, and better CPU time.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The first modification enhances the initial population of the MBGWO using a heuristic based Ant Colony Optimisation algorithm. The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
    Get full text
    Get full text
    Thesis
  12. 12

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…But irrelevant and redundant features are the obstacle for classification algorithm to build an efficient detection model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…The results indicate that the wavelet packet and entropy based features provides better classification accuracy compared to time-domain energy based features and MFCCs and SVD based features for the two more databases. …”
    Get full text
    Thesis
  14. 14

    Feature selection based on particle swarm optimization algorithm for sentiment analysis classification by Nurcahyawati, Vivine, Mustaffa, Zuriani

    Published 2021
    “…Subsequently, the feature selection based on PSO was created to improve the accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…There is no algorithm which shows how to select the representation or choose the features [2] so the selection of features will depend on the application. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  17. 17
  18. 18

    Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana by Hatungimana, Gervais

    Published 2018
    “…Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Mutable composite firefly algorithm for gene selection in microarray based cancer classification by Fajila, Mohamed Nisper Fathima

    Published 2022
    “…Hence, this study proposed to modify the Firefly Algorithm (FA) along with the Correlation-based Feature Selection (CFS) filter for the gene selection task. …”
    Get full text
    Get full text
    Thesis