Search Results - (( development communication mining algorithm ) OR ( java binary classification algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6

    An application of Malay short-form word conversion using levenshtein distance by Rohana, Ismail, Azilawati, Azizan, NurAine, Saidin

    Published 2020
    “…However, nowadays, short-form word has been widely used by many people, especially in online communication. These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    An analysis of text mining factors enhancing the identification of relevant studies by Khashfeh M., Mahmoud M.A., Ahmad M.S.

    Published 2023
    “…The third process is the parsing that is operated by a text mining algorithm. The last part is the storage that is managed by Monitor Agent. …”
    Article
  9. 9

    An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail by Azilawati Azizan, Azilawati Azizan, NurAine Saidin, NurAine Saidin, Nurkhairizan Khairudin, Nurkhairizan Khairudin, Rohana Ismail, Rohana Ismail

    Published 2020
    “…However, nowadays, short-form word has been widely used by many people, especially in online communication. These short-form words trigger problems in the field of data mining, especially those involving online text processing. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A simultaneous spam and phishing attack detection framework for short message service based on text mining approach by Mohd Foozy, Cik Feresa

    Published 2017
    “…This thesis addresses SMS Spam and Phishing attack detection framework development. 3 modules can be found in this framework, of which are Data Collection, Attack Profiling and Text Mining respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines by Aker, Elhadi Emhemed Alhaaj Ammar

    Published 2020
    “…The ADR schemes also presented high computational time due to communication channel breakdown, latency, and susceptibility to the cyberattack since the communication channel is used for the trip command transmission and considering the high cost of communication medium. …”
    Get full text
    Get full text
    Thesis