Search Results - (( java application customization algorithm ) OR ( filing implementation learning algorithm ))
Search alternatives:
- customization algorithm »
- implementation learning »
- filing implementation »
- learning algorithm »
- java application »
-
1
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
6
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
7
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Get full text
Article -
8
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
Get full text
Get full text
Article -
9
Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim
Published 2023“…The global trend in the CCRA study shows that implementing machine learning and deep learning techniques is expanding rapidly. …”
Get full text
Get full text
Thesis -
10
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Perceptions and practices of blended learning in foreign language teaching at USIM
Published 2024journal::journal article -
13
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…In the first phase, the ontology element and algorithm techniques should be selected. While in the second phase, the HTML files are uploaded for processing. …”
Get full text
Get full text
Thesis -
14
Classification of cervical cancer using random forest
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Chinese character recognition using neural network / Low Poh Tian
Published 2003“…The training parameters of the network i.e. the learning rate and momentum has both fixed to 0.6. The extracted image data is then feed into the network, the weights of which are modified by error-backpropagation algorithm. …”
Get full text
Get full text
Thesis -
16
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
17
Pixel-based feature for android malware family classification using machine learning algorithms
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…The mobile robot section shows the fabrication of the mobile robot, construction of gripper arm and some video of the movement of the mobile robot system. The implementation of this multimedia-based learning for robot technology will help to enhance the learning abilities of the engineering students. …”
Get full text
Get full text
Thesis -
19
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…To begin with, the existing state-of-the-art techniques related to anomaly detection, real-time big data technologies and machine learning algorithms have been critically reviewed to identify the problems. …”
Get full text
Get full text
Get full text
Thesis -
20
Software module clustering: An in-depth literature analysis
Published 2022“…Software module clustering is an unsupervised learning method used to cluster software entities (e.g., classes, modules, or files) with similar features. …”
Get full text
Get full text
Get full text
Article
