Search Results - (( developing program bayes algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- developing program »
- java application »
- bayes algorithm »
- program bayes »
-
1
-
2
Divorce prediction using Naive Bayes / Alia Hannani Ahmad Bakri
Published 2024Get full text
Get full text
Thesis -
3
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…Multilayer Perceptron algorithm has been the best algorithm with the highest success percentage in both of the programs; Decision Trees has been the algorithm which has the lowest success percentage again in both of the programs. …”
Get full text
Get full text
Get full text
Article -
6
Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir
Published 2019“…It implemented Supervised Learning algorithm with Bayes’ Theorem model for the calculation of mood prediction using Python programming language. …”
Get full text
Get full text
Thesis -
7
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
8
Development of an intelligent information system for financial analysis depend on supervised machine learning algorithms
Published 2022“…ML can examine millions of data sets in a short period of time without being explicitly programmed to improve the results. This type of algorithm can aid financial institutions in making grant selections for their clients. …”
Get full text
Get full text
Article -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
10
Banana recognition system using convolutional neural network / Mohamad Shafiq Rosli
Published 2021“…The programming is a subject that are used by developer to provide the system. …”
Get full text
Get full text
Thesis -
11
-
12
Android malware detection using permission based static analysis
Published 2024“…The increase of mobile device enhancement grows. With this development, mobile phones are supporting many programs, and everyone takes advantage of them. …”
Get full text
Get full text
Article -
13
Android malware detection using permission based static analysis
Published 2023“…The increase of mobile device enhancement grows. With this development, mobile phones are supporting many programs, and everyone takes advantage of them. …”
Get full text
Get full text
Article -
14
-
15
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
Get full text
Get full text
Thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Empirical study on intelligent android malware detection based on supervised machine learning
Published 2020“…More significantly, this paper empirically discusses and compares the performances of six supervised machine learning algorithms, known as K-Nearest Neighbors (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB), and Logistic Regression (LR), which are commonly used in the literature for detecting malware apps.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
