Search Results - (( process detection mining algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- process detection »
- detection mining »
- mining algorithm »
- java application »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
3
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Subjects:Short Survey -
4
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…The generation of rule is considered a crucial process in data mining and the generated rules are in a huge number. …”
Get full text
Get full text
Thesis -
5
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…Sentiment Analysis refers to natural language processing and text mining approaches to classify thoughts or sentiments from the tweet. …”
Get full text
Get full text
Thesis -
6
A norms mining approach to norms detection in multi-agent systems
Published 2012“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Get full text
Conference or Workshop Item -
7
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
8
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
11
The semantics of norms mining in multi-agent systems
“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Get full text
Conference or Workshop Item -
12
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…The collected datasets were used as inputs for the DM process. In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
Get full text
Get full text
Get full text
Thesis -
13
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
Published 2024thesis::master thesis -
14
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
15
A norms mining approach to norms detection in multi-agent systems
Published 2023“…In this paper, we propose a norms mining technique for a visitor agent to detect the norms of a community of local agents to comply with the community's normative protocol. …”
Conference paper -
16
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
17
The semantics of norms mining in multi-agent systems
Published 2023“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Conference paper -
18
-
19
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
20
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article
