Search Results - (( java _ implementation algorithm ) OR ( parameter classification system algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…In this paper, an improved intrusion detection algorithm for multiclass classification was presented and discussed in detail. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Adaptive parameter control strategy for ant-miner classification algorithm by Al-Behadili, Hayder Naser Khraibet, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…This paper presents a new hybrid Ant-Miner classification algorithm and ant colony system (ACS), called ACS-Ant Miner. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Feature extraction and selection algorithm based on self adaptive ant colony system for sky image classification by Petwan, Montha

    Published 2023
    “…FESSIC outperforms other algorithms for average classification accuracy for the KSVM, MLP, RF and DT classifiers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Affect classification using genetic-optimized ensembles of fuzzy ARTMAPs by Liew, W.S., Seera, M., Loo, C.K., Lim, E.

    Published 2015
    “…In addition, manual design of classification tasks often uses sub-optimum classifier parameter settings, leading to average classification performance. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…The objective of this research is to comparatively evaluate the effectiveness of different algorithms, method combination procedure, and their parameters towards classification accuracy. …”
    Get full text
    Get full text
    Proceeding
  17. 17

    Development of an intelligent prediction tool for rice yield based on machine learning techniques by Md. Sap, Mohd. Noor, Awan, A. M.

    Published 2006
    “…Support vector machine algorithm is developed for classification of rice plantation data. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item