Search Results - (( effective classification learning algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Autism Spectrum Disorder Classification Using Deep Learning by Abdulrazak Yahya, Saleh, Lim Huey, Chern

    Published 2021
    “…The goal of this paper is to evaluate the deep learning algorithm for people placed in the Autism Spectrum Disorder (ASD) classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Waste management using machine learning and deep learning algorithms by Sami, Khan Nasik, Amin, Zian Md Afique, Hassan, Raini

    Published 2020
    “…So, we are proposing an automated waste classification problem utilizing Machine Learning and Deep Learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Automatic email classification system / Phang Siew Ting by Phang , Siew Ting

    Published 2003
    “…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Loan Eligibility Classification Using Machine Learning Approach by Law, Paul Lik Pao

    Published 2023
    “…The performance of the models was compared to identify the most effective algorithm for loan eligibility classification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6
  7. 7

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The aim of this paper to build a network anomaly detection system using machine learning algorithms that are efficient, effective and fast processing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Predicting breast cancer using ant colony optimisation / Siti Sarah Aqilah Che Ani by Che Ani, Siti Sarah Aqilah

    Published 2021
    “…In this study, the ACO algorithm will be compared with another machine learning algorithm - the J48 algorithm - to compare which brings more precise and effective results. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Classification of Planetary Nebulae through Deep Transfer Learning by Dayang N.F., Awang Iskandar, Zijlstra, Albert A., McDonald, Iain, Rosni, Abdullah, Fuller, Gary A., Ahmad H., Fauzi, Johari, Abdullah

    Published 2020
    “…This study investigate the effectiveness of using Deep Learning (DL) for the classification of planetary nebulae (PNe). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Machine learning-based leukemia classification using gene expression for accurate diagnosis by Mahmoud, Amena, Talpur, Kazim Raza, Saini, Shilpa, Talpur, Bandeh Ali, Shah, Asadullah, Zaki, John

    Published 2025
    “…Given the availability of gene expression data, machine learning algorithms have demonstrated considerable promise in recent years for enhancing the accuracy of leukemia classification. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis