Search Results - (( java pattern classification algorithm ) OR ( using internet reporting algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Intelligent DNA signature detection for internet worms by Ghazali, Osman

    Published 2011
    “…Internet scanning worms are widely regarded to be a major security threat faced by the Internet community today. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4
  5. 5

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8
  9. 9

    SENTIMENT ANALYSIS IN SOCIAL NETWORKS USING NAiVE BAYES ALGORITHM by MAHMOUD, MOHAMED YAHYA

    Published 2011
    “…This report is concerned with the opinion mining and sentiment analysis in social networks especially Twitter, it aims to give a brief insight into the ongoing research in sentiment analysis algorithms and techniques, and graphical representation of the statistical results by applying the sentiment analysis on social networks. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Review of materialized views selection algorithm for cyber manufacturing by Mohd Sabri, Nor Amalina, Emran, Nurul Akmar, Md Khushairi, Norazah

    Published 2018
    “…Nevertheless, as MVs requires database space and maintenance, the decision to use MVs is not determined by time factor only. Thus,MVs selection is a problem that calls for an efficient selection algorithm that can deal with several constraints at a time. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Design of monitoring and control system of electricity power limiter using internet of things by Gunoto, Pamor, Yuliansyah, Toni, Nurdin, M., Hisyamuddin, .

    Published 2025
    “…Electrical energy efficiency usage is an important things in the modern era, especially to reduce costs and environmental impacts. This report discusses the design of monitoring and control system using Internet of Things (IoT) based power limiter, which is designed to monitor and manage electricity consumption in real-time. …”
    Get full text
    Get full text
    Book Section
  13. 13

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Internet of things (IoT) based grid tension monitoring system by Lina Khalida, Norazmi

    Published 2022
    “…Using the publish and monitor implementation, data is transmitted over the internet protocol. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17

    Performance analysis of downlink scheduling in 3GPP LTE system / Muhammad Haikal Hashim by Hashim, Muhammad Haikal

    Published 2014
    “…The Round Robin, Best CQI and Proportional Fair scheduling algorithm have been considered in this report. All the implementation, analysis and comparison of these scheduling algorithms were done through simulations executed on a MATLAB-based downlink link level simulator, Vienna LTE Simulator…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20