Search Results - (( binary classification mining algorithm ) OR ( java detection method algorithm ))
Search alternatives:
- binary classification »
- classification mining »
- mining algorithm »
- method algorithm »
- java detection »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…The first objective of this study is to improve a new algorithm technique for classification. The new algorithm come from a combination of an ideas of k-NN algorithm and ensemble concept. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Logic mining method via hybrid discrete hopfield neural network
Published 2025“…Despite the success, the limitations of existing logic mining methods are often overlooked, hindering the search for optimal solutions in binary classification tasks. …”
Get full text
Get full text
Get full text
Article -
9
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
11
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
Get full text
Get full text
Article -
12
-
13
Text steganalysis using evolution algorithm approach
Published 2012“…This study presents a new alternative of steganalysis method in order to detect hidden messages in text steganalysis called Evolution Detection Steganalysis System (EDSS) based on the evolution algorithm approach under Java Genetic Algorithms Package (JGAP). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Enhancement of new smooth support vector machines for classification problems
Published 2011“…Research on Smooth Support Vector Machine (SSVM) for classification problem is an active field in data mining. …”
Get full text
Get full text
Thesis -
15
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Overview of biomedical relations extraction using hybrid rule-based approaches.
Published 2013“…These huge amounts of information cause very difficult task of extraction or classification.Therefore, there is a need for knowledge discovery and text mining tools in this field. …”
Get full text
Get full text
Get full text
Article -
17
Multitasking deep neural network models for Arabic dialect sentiment analysis
Published 2022“…Therefore, a model called Multi-Tasking Learning based on Convolutional Hierarchical Attention Neural Network (MTL-CHAN) is proposed, comprising of (i) shared word encoder and word attention networks across classification tasks, (ii) task-specific layers with convolutional neural network-based attention (CNNA) on sentence-level; to handle the Arabic explicit negation words and improve the classification performance by training Arabic classification tasks (binary, ternary, and five) jointly. …”
Get full text
Get full text
Thesis -
18
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing
Published 2014“…This research concerns on binary classification which is classified into two classes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
