Search Results - (( java operation research algorithm ) OR ( binary classification mining algorithm ))
Search alternatives:
- binary classification »
- classification mining »
- research algorithm »
- mining algorithm »
- java operation »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
2
An improved algorithm for iris classification by using support vector machine and binary random machine learning
Published 2018“…The first objective of this study is to improve a new algorithm technique for classification. The new algorithm come from a combination of an ideas of k-NN algorithm and ensemble concept. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…The proposed method is applied to 14 real world dataset from the machine learning repository. The algorithm’s performance is illustrated by the corresponding table of the classification rate. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
7
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…The design of our method is a kind of One-Against-All multi classification technique to solve the traditional binary classifier in SVM.…”
Get full text
Get full text
Article -
8
-
9
Enhancement of new smooth support vector machines for classification problems
Published 2011“…Research on Smooth Support Vector Machine (SSVM) for classification problem is an active field in data mining. …”
Get full text
Get full text
Thesis -
10
Overview of biomedical relations extraction using hybrid rule-based approaches.
Published 2013“…These huge amounts of information cause very difficult task of extraction or classification.Therefore, there is a need for knowledge discovery and text mining tools in this field. …”
Get full text
Get full text
Get full text
Article -
11
Multitasking deep neural network models for Arabic dialect sentiment analysis
Published 2022“…Therefore, a model called Multi-Tasking Learning based on Convolutional Hierarchical Attention Neural Network (MTL-CHAN) is proposed, comprising of (i) shared word encoder and word attention networks across classification tasks, (ii) task-specific layers with convolutional neural network-based attention (CNNA) on sentence-level; to handle the Arabic explicit negation words and improve the classification performance by training Arabic classification tasks (binary, ternary, and five) jointly. …”
Get full text
Get full text
Thesis -
12
Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing
Published 2014“…This research concerns on binary classification which is classified into two classes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
14
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…The genetic algorithm approach that been used in this research has been proven by other research study before that it will easily handle this types of problem where the optimal solution will be generated. …”
Get full text
Get full text
Thesis -
16
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
17
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Besides that, the system will build in Windows 2000 Professional Operating System. The project approaches the research and development process as a two dimensional recognition problem, capturing the face image by using the web camera. …”
Get full text
Get full text
Thesis -
18
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
19
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
20
