Search Results - (( developing messaging selection algorithm ) OR ( java a function algorithm ))
Search alternatives:
- developing messaging »
- messaging selection »
- selection algorithm »
- function algorithm »
- a function »
- java a »
-
1
Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi
Published 2012“…This project methodology consists of five phases which are preliminary study, data collection and preparation, model development, model evaluation and documentation. This project is designed using negative selection algorithm to automatically classify the Twitter’s messages into its sentiment’s category based on important keyword recognition. …”
Get full text
Get full text
Thesis -
2
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Get full text
Article -
3
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed computing environment has been developed so fast that there’s a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Conference or Workshop Item -
4
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
5
Improvement and performance analysis on statistical selection algorithms
Published 2006“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Conference or Workshop Item -
6
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
7
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
8
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The algorithm is able to reduce the number of messages needed and increases the success rate of all multiple selections in the selection process compared to the previous multiple selection algorithms proposed by Loo in 2005.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
10
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
11
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Thesis -
14
Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat
Published 2012“…The sentiment analysis using clonal selection algorithm for twitter’s data system was developed to achieve the main objective which is to classify the twitter’s messages according three sentiments which are positive, negative and neutral. …”
Get full text
Get full text
Thesis -
15
A Distributed Topology Control Method for Improving Energy Efficiency of Wireless Sensor Networks
Published 2012“…To achieve this, we have developed a novel algorithm called three phase single initiator (TPSI). …”
Get full text
Get full text
Conference or Workshop Item -
16
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
Get full text
Get full text
Thesis -
18
-
19
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…As a result, the objectives for this project are to study the most suitable algorithms used for a movie recommender system, to implement Collaborative Filtering algorithm on a movie recommender system prototype and to test the functionality of the movie recommender system, hi this project, a movie recommendation system with the use of Collaborative Filtering is proposed to produce a set list of movies for the users. …”
Get full text
Get full text
Thesis -
20
Steganography based on utilizing more surrounding pixels
Published 2010“…The purpose of this study is to investigate the application of least significant bit insertion method (LSB) in concealing a definite amount of message bits inside a typical media such as an 8-bit gray-scale image and develop an alternative model structure selection algorithm based on considering more surrounding pixels in order to compute the best capacity value for each target pixel. …”
Get full text
Get full text
Thesis
