Search Results - (( java implementation learning algorithm ) OR ( using message mining algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- mining algorithm »
- message mining »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Parallel execution of distributed SVM using MPI (CoDLib)
Published 2023“…Message Passing Interface (MPI) is used in the communication between machines in the cluster. …”
Conference paper -
3
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…The Phishing Rule-Based algorithm is used to extract SMS Phishing. For Module 2, the SMS Attack Profiling algorithm is used in order to produce SMS Spam and Phishing words. …”
Get full text
Get full text
Get full text
Thesis -
4
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
5
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
6
-
7
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024thesis::doctoral thesis -
8
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
Network problems detection and classification by analyzing syslog data
Published 2016“…The method used data mining tool to classify the syslog messages while the description part of the syslog message was used for classification process. …”
Get full text
Get full text
Get full text
Thesis -
12
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat
Published 2012“…The sentiment analysis using clonal selection algorithm for twitter’s data system was developed to achieve the main objective which is to classify the twitter’s messages according three sentiments which are positive, negative and neutral. …”
Get full text
Get full text
Thesis -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
16
Analytical method for forensic investigation of social networking applications on smartphones
Published 2016“…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
Get full text
Get full text
Get full text
Thesis -
17
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
18
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
19
-
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
