Search Results - (( evolution classification modeling algorithm ) OR ( java information using algorithm ))
Search alternatives:
- evolution classification »
- classification modeling »
- modeling algorithm »
- information using »
- java information »
- using algorithm »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
5
Classification of Immunosignature Using Random Forests for Cancer Diagnosis
Published 2015“…In this work, we will develop a robust classification model that can be utilized in cancer diagnosis using immunofingerprint data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
-
8
-
9
Deep learning detector for pests and plant disease recognition
Published 2020“…Meanwhile, evolution in deep convolutional neural networks for image classification has rapidly improved the accuracy of object detection, classification and system recognition. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Finally, a new logic mining model namely Y-Type Random 2-Satisfiability Reverse Analysis was proposed, which showed optimal performances in terms of several metrics as compared to the existing classification models. …”
Get full text
Get full text
Thesis -
11
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…However, the learning complexity of classification is increased due to the expansion number of learning model. …”
Get full text
Get full text
Thesis -
12
Digital economy tax compliance model in Malaysia using machine learning approach
Published 2021“…The experimental results show that the ensemble method can improve the single classification model’s accuracy with the highest classification accuracy of 87.94% compared to the best single classification model. …”
Get full text
Get full text
Get full text
Article -
13
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Feature selection was used to sort out key features for further classification. News classification into factors affecting stock market turning point was done using Naïve Bayes, Deep Learning, Generalized Linear Model (GLM) and Support Vector Machine (SVM). …”
Get full text
Get full text
Book Section -
16
-
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
Get full text
Get full text
Article -
19
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
20
ios Mobile Malware Deep Analysis And Classification For Social Media And Online Banking Exploitation
Published 2024thesis::master thesis
