Search Results - (( simulation optimization mining algorithm ) OR ( java information using algorithm ))
Search alternatives:
- information using »
- mining algorithm »
- java information »
- using algorithm »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
-
3
-
4
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Logic mining method via hybrid discrete hopfield neural network
Published 2025“…To demonstrate the efficacy of the proposed logic mining approach, experiments were conducted using both simulated and real-world datasets. …”
Get full text
Get full text
Get full text
Article -
8
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
9
-
10
Logic Mining Approach: Shoppers’ Purchasing Data Extraction via Evolutionary Algorithm
Published 2023“…The simulation suggested that the proposed model outperformed the existing model in doing logic mining for the online shoppers dataset.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
Get full text
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
-
16
Metaheuristic optimization of perovskite solar cell performance using Taguchi grey relational analysis with grey wolf optimizer
Published 2025“…The metaheuristic approach sequentially employs the L27 orthogonal array (OA) Taguchi-based design of experiment (DoE), Grey Relational Analysis (GRA), Multiple Linear Regression (MLR) and Grey Wolf Optimizer (GWO). The L27 OA Taguchi-based DoE is initially employed to mine sufficient output data simulated using one dimensional solar cell capacitance simulator (SCAPS-1D). …”
Get full text
Get full text
Get full text
Article -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers
