Search Results - (( java application _ algorithm ) OR ( software optimization mining algorithm ))
Search alternatives:
- software optimization »
- java application »
- mining algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
Evaluation of data mining models for predicting concrete strength
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
-
5
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
6
-
7
Training functional link neural network with ant lion optimizer
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
A direct ensemble classifier for imbalanced multiclass learning
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A comparative analysis of software engineering approaches for sequence analysis
Published 2013“…The proposal describes the concepts, tools, methodologies, and algorithms being used for sequence analysis. The sequences contain the precious information that needs to be mined for useful purposes. …”
Get full text
Get full text
Book -
13
-
14
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014Get full text
Get full text
Conference or Workshop Item -
15
Data normalization techniques in swarm-based forecasting models for energy commodity spot price
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
16
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
17
-
18
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
19
-
20
