Search Results - (( java pattern classification algorithm ) OR ( filing adoption optimization algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimizing lossless compression by normalized data length in Huffman Algorithm by Tonny, Hidayat

    Published 2022
    “…The proposed new algorithm has more optimal CR than the various variants of the Huffman-based lossless application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Dynamic replica replacement strategy in data grid by Soosai, Alexis M., Abdullah, Azizol, Othman, Mohamed, Latip, Rohaya, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2012
    “…Replication approach can shorten the time of fetching the files by creating many replicas stored in appropriate sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…In fact, bandwidth estimation is very beneficial to optimize the performance of end-to-end transport in several overlay applications such as Content Distribution Networks (CDNs), Peer-to-Peer (P2P) file sharing, and dynamic overlay routing. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Workload performance evaluation of large spatial database for DSS based disaster management by Rohman, Muhammad Syaifur

    Published 2017
    “…Then, all the workload that are obtained to determine the processes are recorded into one excel file. The Case Based Reasoning (CBR) optimized with Hash Search Technique has been adopted in this study for the purpose of evaluating and predicting the workload performance of PostgreSQL DBMS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis