Search Results - (( text classification mining algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…Text classification (TC) is an important foundation of information retrieval and text mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Document classification based on kNN algorithm by term vector space reduction by Moldagulova A., Sulaiman R.B.

    Published 2023
    “…Classification (of information); Data handling; Data mining; Information retrieval systems; Learning algorithms; Text processing; Vectors; Document Classification; Space reductions; Text classifiers; Text mining; Textual data; Unstructured data; Vector spaces…”
    Conference Paper
  8. 8
  9. 9
  10. 10

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Ant colony algorithm for web page classification by Moayed, Majid Javid, Sabery, A. Hamid, Khanteymoory, Alireza

    Published 2008
    “…Ant Miner II is the used algorithm. It also propose a simple text preprocessing technique to reduce the large numbers of attributes associated with web content mining, without dealing linguistic complications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  20. 20