Search Results - (( java implementation learning algorithm ) OR ( using message selection algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- selection algorithm »
- learning algorithm »
- message selection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
3
Sentiment analysis using negative selection algorithm for Twitter’s messages / Nazirah Che Alhadi
Published 2012“…This project is designed using negative selection algorithm to automatically classify the Twitter’s messages into its sentiment’s category based on important keyword recognition. …”
Get full text
Get full text
Thesis -
4
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…Two multiple selection algorithm, which are known as “static filter range selection algorithm” and “self-scalable selection algorithm” are proposed. …”
Get full text
Get full text
Thesis -
5
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
Published 2024journal::journal article -
6
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. Loo et. al. (2002) has proposed a statistical selection algorithm with the same objective and run in multicast / broadcast environment that has been proved that it is the best among others in terms of the number of messages needed to complete the searching process. …”
Get full text
Get full text
Get full text
Article -
7
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
8
Randomized pixel selection for enhancing LSB algorithm security against brute-force attack
Published 2017“…In this study, we propose a random selection of pixels that hold a secret message based on an integer solution of the elliptic curve equation. …”
Get full text
Get full text
Article -
9
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
11
Integrated Mobile Spain Model Using Artificial Immune System Algorithms
Published 2024Proceedings Paper -
12
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
13
A novel and high capacity audio steganography algorithm based on adaptive data embedding positions
Published 2023“…Comparisons with the related audio steganography algorithms also show that our proposed scheme outperforms all the selected algorithms. © Maxwell Scientific Organization, 2014.…”
Article -
14
Message based random variable length key encryption algorithm.
Published 2009“…A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
15
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…For example,the spammer changes patterns of message for making spam such as writing the message by JavaScript, using different advertising images and words to form features or attributes. …”
Get full text
Get full text
Thesis -
16
Static range multiple selection algorithm for peer-to-peer system
Published 2011“…The algorithm is able to reduce the number of messages needed and increases the success rate of all multiple selections in the selection process compared to the previous multiple selection algorithms proposed by Loo in 2005.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Thesis -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
19
Automated feature selection using boruta algorithm to detect mobile malware
Published 2020“…Boruta algorithm is used to select features automatically for assisting the machine learning. …”
Get full text
Get full text
Get full text
Article -
20
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis
