Search Results - (( java implementation _ algorithm ) OR ( using missing data algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3
  4. 4

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…AC complement algorithm was used to compare the different in each set of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Identifying the Ideal Number Q-Components of the Bayesian Principal Component Analysis Model for Missing Daily Precipitation Data Treatment by Chuan, Zun Liang, Azlyna, Senawi, Wan Nur Syahidah, Wan Yusoff, Noriszura, Ismail, Tan, Lit Ken, Mu, Wen Chuan

    Published 2018
    “…Contrarily, the single imputation algorithm is superior in missing daily precipitation data treatment for an inland region time series rather than the BPCAQ-VB algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…Decision tree algorithms have the ability to deal with missing values or wrong data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    An Evaluation of Machine Learning Algorithms for Missing Values Imputation by Kohbalan, Moorthy, Ali, Mohammed Hasan, Mohd Arfian, Ismail, Chan, Weng Howe, Mohd Saberi, Mohamad, Safaai, Deris

    Published 2019
    “…It represents the research and imputation of missing values in gene expression data. By using the local or global correlation of the data we focus mostly on the contrast of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    An improved K-nearest neighbour with grasshopper optimization algorithm for imputation of missing data by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2021
    “…K-nearest neighbors (KNN) has been extensively used as imputation algorithm to substitute missing data with plausible values. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…In the historical data, however, there are missing values due to broken equipment sensors probes and different time rate sensors. …”
    Get full text
    Get full text
    Article
  16. 16

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  17. 17

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Development of an imputation technique - INI for software metric database with incomplete data by Wasito, Ito, Olanrewaju, Rashidah F.

    Published 2007
    “…This technique was used for estimating missing data in a software engineering database (PROMISE). …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Missing values lead to the difficulty of extracting useful information from that data set. …”
    Get full text
    Get full text
    Thesis