Search Results - (( java implementation a algorithm ) OR ( based missing data algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad

    Published 2024
    “…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    The Effectiveness Of A Probabilistic Principal Component Analysis Model And Expectation Maximisation Algorithm In Treating Missing Daily Rainfall Data by Zun Liang, Chuan, Fam, Soo Fen, Mohd Deni, Sayang, Ismail, Noriszura

    Published 2020
    “…Therefore, this paper proposes a multiple-imputation algorithm for treating missing data without requiring information from adjoining monitoring stations. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    The effectiveness of a probabilistic principal component analysis model and expectation maximisation algorithm in treating missing daily rainfall data by Chuan, Zun Liang, Sayang, Mohd Deni, Fam, Soo-Fen, Noriszura, Ismail

    Published 2020
    “…Therefore, this paper proposes a multiple-imputation algorithm for treating missing data without requiring information from adjoining monitoring stations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    An Evaluation of Machine Learning Algorithms for Missing Values Imputation by Kohbalan, Moorthy, Ali, Mohammed Hasan, Mohd Arfian, Ismail, Chan, Weng Howe, Mohd Saberi, Mohamad, Safaai, Deris

    Published 2019
    “…It represents the research and imputation of missing values in gene expression data. By using the local or global correlation of the data we focus mostly on the contrast of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An improved K-nearest neighbour with grasshopper optimization algorithm for imputation of missing data by Zainal Abidin, Nadzurah, Ismail, Amelia Ritahani

    Published 2021
    “…Thus, this paper proposes a novel method for imputation of missing data, named KNNGOA, which optimized the KNN imputation technique based on the grasshopper optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Classification rules were generated based on the best reduct. For the problem of missing data, a new approach was proposed based on data partitioning and function mode. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…The novel optimization-based artificial intelligence algorithm proposed in this paper implies an improved way to overcome a real engineering challenge i.e. handling missing values for better RUL prediction, hence bringing great opportunities for the domain area. …”
    Get full text
    Get full text
    Article
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item