Search Results - (( java implementation a algorithm ) OR ( missing data learning algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…So, the application of the theory as part of the learning models was proposed in this thesis. Two different models for learning in data sets were proposed based on two different reduction algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    ExtraImpute: a novel machine learning method for missing data imputation by Alabadla, Mustafa, Sidi, Fatimah, Ishak, Iskandar, Ibrahim, Hamidah, Affendey, Lilly Suriani, Hamdan, Hazlina

    Published 2022
    “…Its existence usually leads to undesirable results while conducting data analysis using machine learning methods. Recently, researchers have proposed several imputation approaches to deal with missing values in real-world datasets. …”
    Get full text
    Get full text
    Article
  7. 7

    Imputation Analysis of Time-Series Data Using a Random Forest Algorithm by Nur Najmiyah, Jaafar, Muhammad Nur Ajmal, Rosdi, Khairur Rijal, Jamaludin, Faizir, Ramlie, Habibah, Abdul Talib

    Published 2024
    “…Missing data poses a significant challenge in extensive datasets, particularly those containing time-series information, leading to potential inaccuracies in data analysis and machine learning model development. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A novel approach for handling missing data to enhance network intrusion detection system by Tahir, Mahjabeen, Abdullah, Azizol, Udzir, Nur Izura, Kasmiran, Khairul Azhar

    Published 2025
    “…To address this issue, we introduce DeepLearning_Based_MissingData_Imputation (DMDI), a novel method designed to enhance the quality of input data by efficiently handling missing values. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…This can significantly affect the prediction results and making it less accurate due to missing value and become a challenging issue. Missing values in datasets is a synonymous problem in data mining which could lead to an incomplete dataset, making inaccurate predictions results in machine learning prediction processes. …”
    Get full text
    Get full text
    Article
  12. 12

    Intelligent imputation method for mix data-type missing values to improve data quality by Alabadla, Mustafa R. A.

    Published 2024
    “…Missing data is a widespread data quality issue across various domains. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  16. 16

    Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid by Wahid, Muhammad Hazim

    Published 2022
    “…The methodology includes drive test measurement for data collection, exploratory data analysis, data preparation, and applying machine learning algorithms to predict mobile network performance. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…In the digital forensic investigation and missing data files retrieval in general, there is a challenge of recovering files that have missing system information. …”
    Get full text
    Article
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book