Search Results - (( evolution classification rules algorithm ) OR ( java application model algorithm ))
Search alternatives:
- evolution classification »
- classification rules »
- application model »
- java application »
- rules algorithm »
- model algorithm »
-
1
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Experimental results demonstrated the compatibility of the proposed logical rule and the Discrete Hopfield Neural Network. Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
Get full text
Get full text
Thesis -
2
Stock market turning points rule-based prediction / Lersak Photong … [et al.]
Published 2021“…Simultaneously, news sentiment analysis techniques were used to discover the polarity of news according to each factor. From news classification and news sentiment, a rule-based algorithm was used to predict the stock market turning points. …”
Get full text
Get full text
Book Section -
3
-
4
-
5
-
6
-
7
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The SVM is a training algorithm for learning classification and regression rules from data [7]. …”
Get full text
Get full text
Article -
8
Email spam classification based on deep learning methods: A review
Published 2025“…Email spam is a significant issue confronting both email consumers and providers. The evolution of spam filtering has progressed considerably, transitioning from basic rule-based filters to more sophisticated machine learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
-
15
Application of data mining techniques for economic evaluation of air pollution impact and control
Published 2007“…Data mining techniques applied in this thesis were: 1) Group method of data handling (GMDH), originally from engineering, introducing principles of evolution - inheritance, mutation and selection - for generating a network structure systematically to develop the automatic model, synthesis, and its validation; 2) The weighted least square (WLS) and step wise regression were also applied for some cases; 3) The classification-based association rules were applied. …”
Get full text
Get full text
Thesis -
16
-
17
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
20
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper
