Search Results - (( associative classification based algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    An enhanced feature selection technique for classification of group based holy Quran verses by Abdullahi Oyekunle, Adeleke

    Published 2018
    “…However, the major setbacks with the existing feature selection techniques are high computational runtime associated with wrapper-based FS techniques and low classification accuracy performance associated with filter-based FS techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An enhanced feature selection technique for classification of group-based holy quran verses by Oyekunle, Adeleke Abdullahi

    Published 2018
    “…However, the major setbacks with the existing feature selection techniques are high computational runtime associated with wrapper-based FS techniques and low classification accuracy performance associated with filter-based FS techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Using fuzzy association rule mining in cancer classification by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2011
    “…A new algorithm has been developed to identify the fuzzy rules and significant genes based on fuzzy association rule mining. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Breast cancer detection by using associative classifier with rule refinement method based on relevance feedback by Abubacker, Nirase Fathima, Azman, Azreen, Doraisamy, Shyamala, Azmi Murad, Masrah Azrifah

    Published 2022
    “…Several researchers have proposed the use of associative classifier that generates strong associations between features and reveals hidden relationship that can be missed by other classification algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…On the other hand maximal itemset based association rules, that are a subset of closed itemset based rules, show to be insufficient in this regard, and typically will have worse recall and generalization power. …”
    Get full text
    Get full text
    Article
  12. 12

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…However, supervised learning technique has limitations for malware classification task. This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam by Asrul, Adam

    Published 2017
    “…At first, a peak classification algorithm is developed based on the general following processes including peak candidate identification, feature extraction, and classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…The advantage of the cluster labelling algorithm compared to co-spectral plot and maximum-likelihood classifier was the algorithm provided a rapid production of high accuracy classification map.…”
    Get full text
    Get full text
    Thesis
  15. 15

    A Performance Evaluation of Chi-Square Pruning Techniques in Class Association Rules Optimization by Chern-Tong, H., Aziz, I.A.

    Published 2018
    “…The noisy data affected support value of an itemset and so it influenced the performance of an associative classification. The performance of associative classification is relied on the classification where the classification is worked based on the class association rules which generated from frequent rule mining process. …”
    Get full text
    Get full text
    Article
  16. 16

    A Performance Evaluation of Chi-Square Pruning Techniques in Class Association Rules Optimization by Chern-Tong, H., Aziz, I.A.

    Published 2018
    “…The noisy data affected support value of an itemset and so it influenced the performance of an associative classification. The performance of associative classification is relied on the classification where the classification is worked based on the class association rules which generated from frequent rule mining process. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems by Bahloul, M.R., Yusoff, M.Z., Abdel-Aty, A.-H., Saad, M.N.M.

    Published 2016
    “…This can be performed by employing a Modulation Classification (MC) algorithm, which can be feature-based or likelihood-based. …”
    Get full text
    Get full text
    Article
  19. 19

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal