Search Results - (( write classification mining algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- classification mining »
- write classification »
- application matching »
- mining algorithm »
- java application »
-
1
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
2
-
3
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
Get full text
Get full text
Thesis -
4
Finger Motion In Classifying Offline Handwriting Patterns
Published 2017“…This study involves the features extractions from handwriting patterns of 30 subjects with recorded videos of finger movements during writings. Raw data undergo three stages of data mining analyses; data preprocessing, data classification and data interpretation. …”
Get full text
Get full text
Monograph -
5
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
-
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
