Search Results - (( developing commerce optimization algorithm ) OR ( java pattern classification algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Adaptive genetic algorithm to improve negotiation process by agents e-commerce by Ebadi, Sahar

    Published 2011
    “…In the past decade we have witnessed the rapid growth of negotiation agent systems in electronic commerce (e-commerce). A huge number of works have been done in order to develop adaptive negotiation agent systems. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Route Optimization based on Clustering and Travelling Salesman Problem by Khadijah, Thahira, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad, Haidar Mirza, Misinem, .Misinem

    Published 2022
    “…Therefore, this paper aims to introduce The Route Optimization approaches that are developed to enhance the efficiency of the day-to-day operation in the logistics industry at one leading distribution company, CV. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
    text::Thesis
  10. 10
  11. 11

    Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment by Xing, Wan

    Published 2025
    “…To address the limitation of traditional color enhancement algorithms that lack adaptive learning capabilities, three types of Variation Color Shift (VCS) algorithms have also been proposed for data augmentation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and implementation of a private and public key crypto processor for next-generation it security applications by Hani, Mohamed Khalil, Wen, Hau Yuan, Paniandi, Arul

    Published 2006
    “…This paper presents the design and implementation of a crypto processor, a special-purpose embedded system optimized for the execution of cryptographic algorithms in hardware. …”
    Get full text
    Get full text
    Get full text
    Article