Search Results - (( java implementation a algorithm ) OR ( missing process learning algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Tangible interaction learning model to enhance learning activity processes among children with dyslexia by Jamalai@Jamali, Siti Nurliana

    Published 2024
    “…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…This can significantly affect the prediction results and making it less accurate due to missing value and become a challenging issue. Missing values in datasets is a synonymous problem in data mining which could lead to an incomplete dataset, making inaccurate predictions results in machine learning prediction processes. …”
    Get full text
    Get full text
    Article
  7. 7

    Intelligent imputation method for mix data-type missing values to improve data quality by Alabadla, Mustafa R. A.

    Published 2024
    “…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  13. 13

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…In the digital forensic investigation and missing data files retrieval in general, there is a challenge of recovering files that have missing system information. …”
    Get full text
    Article
  14. 14

    Classification of JPEG files by using extreme learning machine by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
    Get full text
    Get full text
    Article
  15. 15

    Machine learning model for performance prediction in mobile network management / Muhammad Hazim Wahid by Wahid, Muhammad Hazim

    Published 2022
    “…One of the major challenges when applying machine learning is to identify the best algorithm from a variety of algorithms to solve a problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Estimating Missing Precipitation to Optimize Parameters for Prediction of Daily Water Level Using Artificial Neural Network by Dayang Suhaila, Awang Suhaili

    Published 2006
    “…The back propagation algorithm was adopted for this study. The optimal model for predicting missing data found in this study is the network with the combination of learning rate and the number of neurons in the hidden layer of 0.2 and 60. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Development of lung cancer prediction system using meta-heuristic optimized deep learning model by Mohamed Shakeel, Pethuraj

    Published 2023
    “…The algorithm detects the affected region depending on pixel similarity computation process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers