Search Results - (( java _ implementation algorithm ) OR ( missing process learning algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Tangible interaction learning model to enhance learning activity processes among children with dyslexia by Jamalai@Jamali, Siti Nurliana

    Published 2024
    “…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…This can significantly affect the prediction results and making it less accurate due to missing value and become a challenging issue. Missing values in datasets is a synonymous problem in data mining which could lead to an incomplete dataset, making inaccurate predictions results in machine learning prediction processes. …”
    Get full text
    Get full text
    Article
  7. 7

    Intelligent imputation method for mix data-type missing values to improve data quality by Alabadla, Mustafa R. A.

    Published 2024
    “…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…In the digital forensic investigation and missing data files retrieval in general, there is a challenge of recovering files that have missing system information. …”
    Get full text
    Article
  13. 13

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Classification of JPEG files by using extreme learning machine by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
    Get full text
    Get full text
    Article
  15. 15

    Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid by Wahid, Muhammad Hazim

    Published 2022
    “…One of the major challenges when applying machine learning is to identify the best algorithm from a variety of algorithms to solve a problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  17. 17

    Estimating Missing Precipitation to Optimize Parameters for Prediction of Daily Water Level Using Artificial Neural Network by Dayang Suhaila, Awang Suhaili

    Published 2006
    “…The back propagation algorithm was adopted for this study. The optimal model for predicting missing data found in this study is the network with the combination of learning rate and the number of neurons in the hidden layer of 0.2 and 60. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Development of lung cancer prediction system using meta-heuristic optimized deep learning model by Mohamed Shakeel, Pethuraj

    Published 2023
    “…The algorithm detects the affected region depending on pixel similarity computation process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  20. 20