Search Results - (( text detection mining algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- optimized algorithm »
- detection mining »
- mining algorithm »
- java application »
- text detection »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…In Comparison to other text outlier detection method, this approach managed to capture the semantics of documents through the use of CGs and is convenient to detect outliers through a simple dissimilarity function.Furthermore, our proposed algorithm retains a linear complexity with the increasing number of CGs.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
6
Analysis of Data Mining Tools for Android Malware Detection
Published 2019Get full text
Get full text
Get full text
Article -
7
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
8
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Research Reports -
9
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…This paper applies sentiment analysis, text mining, and machine learning to psychology to identify depression in Twitter user. …”
Get full text
Get full text
Thesis -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
-
12
A simultaneous spam and phishing attack detection framework for short message service based on text mining approach
Published 2017“…Additionally, the proposed framework also can detect the attack simultaneously using text mining approaches.…”
Get full text
Get full text
Get full text
Thesis -
13
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
14
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007Get full text
Get full text
Conference or Workshop Item -
15
Designing a new model to detect Trojan Horse based on knowledge discovery and data mining
Published 2024thesis::master thesis -
16
-
17
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
18
-
19
-
20
