Search Results - (( java pattern classification algorithm ) OR ( using e application algorithm ))
Search alternatives:
- pattern classification »
- application algorithm »
- e application »
- using e »
- java »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
3
Enhance key generation algorithm based user string identity as public key
Published 2015“…However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. …”
Get full text
Get full text
Thesis -
4
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…This new trend gives an advantage to cryptanalyst since types of algorithm(s) used are no longer a secret. Cryptanalysis steps can be easily explained using algorithm animation that can be easily integrated with any e-learning platform. …”
Get full text
Get full text
Get full text
Article -
5
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The algorithms work by arranging parameters using finite field group in elliptic curve E. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
7
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
8
An improvement of stochastic gradient descent approach for mean-variance portfolio optimization problem
Published 2021“…It is noticed that the AdamSE algorithm has the smallest iteration number. ,e results show that the rate of convergence of the Adam algorithm is significantly enhanced by using the AdamSE algorithm. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
11
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
12
-
13
Using a priori algorithm for supporting e-commerce system
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
14
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…It is essential to provide new platforms that benefit the user and are more convenient to use. The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction
Published 2014“…Upon the completion of data collection and data pre processing, the eABC-LSSVM algorithm is designed and developed. …”
Get full text
Get full text
Get full text
Thesis -
20
Steganography algorithm to hide secret message inside an image
Published 2011Get full text
Get full text
Article
