Search Results - (( simulation computer mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- mining algorithm »
- java application »
- computer mining »
-
1
Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting
Published 2014“…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
Get full text
Get full text
Article -
2
-
3
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
4
-
5
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
Get full text
Get full text
Monograph -
6
RMIL/AG: A new class of nonlinear conjugate gradient for training back propagation algorithm
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction
Published 2024“…Therefore, a fuzzy model based on machine learning and data mining is a vital solution. In this study, ten supervised machine learning algorithms namely the J48, Logistic, NaiveBayes Updateable, RandomTree, BayesNet, AdaBoostM1, Random Forest, Multilayer Perceptron, Bagging and Stacking are applied for a simulated diabetes fuzzy dataset, verified by medical experts. …”
Get full text
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
11
Development and implementation of a technique for norms-adaptable agents in open multi-agent communities
Published 2023“…Computer science; Systems science; Agent based simulation; Mining algorithms; Multi-agent community; nocv1; Normative agents; norms deatetcin; Norms detections; Third parties; Verification process; Multi agent systems…”
Article -
12
-
13
-
14
Discretization of integrated moment invariants for writer identification
Published 2008“…Mathematical proving and results of computer simulations are embraced to attest the feasibility of the proposed technique in Writer Identification. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…Mobile edge cloud computing (MECC) systems extend computational, networking, and storage capabilities of centralized cloud computing systems through edge servers at one-hop wireless distances from mobile devices. …”
Get full text
Get full text
Get full text
Thesis -
17
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
18
The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy
Published 2022“…Cryptojacking is a subset of cybercrime in which hackers use unauthorised devices (computers, smartphones, tablets, and even servers) to mine cryptocurrencies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
A new history matching sensitivity analysis framework with random forests and Plackett-Burman design
Published 2017“…Here, there is no significant change in terms of computation time as we increase the number of trees from 100 to 500; total computation time is less than 10 seconds. …”
Get full text
Get full text
Article
