Search Results - (( developing messaging selection algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing messaging »
- messaging selection »
- selection algorithm »
- implication based »
- java implication »
-
1
Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi
Published 2012“…This project methodology consists of five phases which are preliminary study, data collection and preparation, model development, model evaluation and documentation. This project is designed using negative selection algorithm to automatically classify the Twitter’s messages into its sentiment’s category based on important keyword recognition. …”
Get full text
Get full text
Thesis -
2
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Get full text
Article -
3
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed computing environment has been developed so fast that there’s a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Conference or Workshop Item -
4
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
5
Improvement and performance analysis on statistical selection algorithms
Published 2006“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Conference or Workshop Item -
6
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
7
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The algorithm is able to reduce the number of messages needed and increases the success rate of all multiple selections in the selection process compared to the previous multiple selection algorithms proposed by Loo in 2005.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
9
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
10
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Thesis -
11
Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat
Published 2012“…The sentiment analysis using clonal selection algorithm for twitter’s data system was developed to achieve the main objective which is to classify the twitter’s messages according three sentiments which are positive, negative and neutral. …”
Get full text
Get full text
Thesis -
12
A Distributed Topology Control Method for Improving Energy Efficiency of Wireless Sensor Networks
Published 2012“…To achieve this, we have developed a novel algorithm called three phase single initiator (TPSI). …”
Get full text
Get full text
Conference or Workshop Item -
13
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
Get full text
Get full text
Thesis -
14
Steganography based on utilizing more surrounding pixels
Published 2010“…The purpose of this study is to investigate the application of least significant bit insertion method (LSB) in concealing a definite amount of message bits inside a typical media such as an 8-bit gray-scale image and develop an alternative model structure selection algorithm based on considering more surrounding pixels in order to compute the best capacity value for each target pixel. …”
Get full text
Get full text
Thesis -
15
-
16
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…The performance of ten (10) machine learning algorithms were evaluated to select the best classifier for both SADM and SMDM. …”
Get full text
Get full text
Get full text
Thesis -
17
Performance of various forecasting algorithms to reduce the number of transmitted packets by sensor node in wireless sensor networks
Published 2018“…The simulation experiments are done using MATLAB software for a variety of algorithms. The selected algorithms for the reduction algorithm in the transmissions include Move Average algorithm (MA), Autoregressive all-pole model parameters — Burg’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development of a Reliable Multicast Protocol in Mobile Ad Hoc Networks
Published 2008“…The first algorithm is developed to avoid the buffer overflow in the FS nodes. …”
Get full text
Get full text
Thesis -
19
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Short Messaging Service (SMS) is one type of many communication mediums that are used by scammers to send persuasive messages that will attract unwary recipients. …”
Get full text
Get full text
Get full text
Thesis -
20
Secured HF image transmission system
Published 2006“…Communications is no longer limited to voice and telegraphy, but now include applications such as email, text messaging, image, and telemetry. This project looks into the design and development of an image transmission system that for use in the HF radio frequency spectrum. …”
Get full text
Get full text
Monograph
