Search Results - (( mining classification cell algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- mining classification »
- classification cell »
- java application »
- cell algorithm »
-
1
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024Subjects: “…Dendritic Cell Algorithm (DCA)…”
journal::journal article -
2
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis -
3
A hybrid approach for artificial immune recognition system / Mahmoud Reza Saybani
Published 2016“…Resource competition part of AIRS poses another problem, here, premature memory cells are generated and therefore classification accuracy decreases. …”
Get full text
Get full text
Thesis -
4
Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms
Published 2021“…The objective of this study is to perform DM classification using various machine learning algorithms using Weka as a tool. …”
Get full text
Get full text
Final Year Project -
5
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
Get full text
Get full text
Get full text
Article -
6
Classification of Diabetes Mellitus using Ensemble Algorithms
Published 2021“…The objective of this study is to perform DM classification using various machine learning algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
7
Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI)
Published 2024“…Weka software was used for “data mining” to get insights from a vast dataset. Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
