Search Results - (( topic classification mining algorithm ) OR ( java application design algorithm ))
Search alternatives:
- classification mining »
- topic classification »
- application design »
- mining algorithm »
- java application »
- design algorithm »
-
1
Comparative analysis for topic classification in juz Al-Baqarah
Published 2018“…The SVM performance is then compared against other classification algorithms such as Naive Bayes, J48 Decision Tree and K-Nearest Neighbours. …”
Get full text
Get full text
Article -
2
A direct ensemble classifier for imbalanced multiclass learning
Published 2012“…Researchers have shown that although traditional direct classifier algorithm can be easily applied to multiclass classification, the performance of a single classifier is decreased with the existence of imbalance data in multiclass classification tasks.Thus, ensemble of classifiers has emerged as one of the hot topics in multiclass classification tasks for imbalance problem for data mining and machine learning domain.Ensemble learning is an effective technique that has increasingly been adopted to combine multiple learning algorithms to improve overall prediction accuraciesand may outperform any single sophisticated classifiers.In this paper, an ensemble learner called a Direct Ensemble Classifier for Imbalanced Multiclass Learning (DECIML) that combines simple nearest neighbour and Naive Bayes algorithms is proposed. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Student performance classification using support vector machine (SVM) with polynomical kernel on online student activities / Muhammad Hareez Mohd Zaki ... [et al.]
Published 2023“…The increasing usage of classification algorithms has encouraged researchers to explore many topics, including academic-related topics. …”
Get full text
Get full text
Article -
4
Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart...
Published 2023“…Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
Get full text
Get full text
Get full text
Thesis -
5
Feature selection methods application towards a new dataset based on online student activities / Muhammad Hareez Mohd Zaki ... [et al.]
Published 2023“…The increasing usage of classification algorithms has encouraged researchers to explore many topics including academic-related topics. …”
Get full text
Get full text
Article -
6
Application of Optimization Methods for Solving Clustering and Classification Problems
Published 2011“…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…In order to improve recognition of high interclass similarity activities, One-Versus- All (OVA) binarization strategy is introduced by transforming original multi-class classification problems into a series of two-class classification problems. …”
Get full text
Get full text
Thesis -
10
-
11
Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election
Published 2024“…To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
Get full text
Get full text
Get full text
Journal -
12
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
13
-
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
-
16
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
18
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
19
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…This study aims to solve the problem for software developers or students having difficulty to identify the bad software design in their software product. Thus, by providing an algorithm analyzer to analyze the quality of design of the software product, developers or students can identify possible bad software design in their application.…”
Get full text
Get full text
Article -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
