Search Results - (( java implementation learning algorithm ) OR ( data evaluation using algorithm ))

Refine Results
  1. 1

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review by Uddin, Mueen, Darabidarabkhani, Yasaman, Shah, Asadullah, Memon, Jamshed

    Published 2015
    “…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Performance evaluation for different data encryption algorithms on wireless sensor network (WSN) by Mhawesh, Thoalfekarali Zuhair

    Published 2018
    “…Therefore, the aim of the project is to analyse and evaluate various different algorithms used image encryption in WSN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of caching placement algorithms in named data network for video on demand service by Abbas, Rasha Salem

    Published 2016
    “…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman by Mohd Rahiman, Nurulizzah

    Published 2024
    “…The evaluation of algorithms consists of comparing the accuracy, specificity, and other evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…The results indicate that the AGMB algorithm outperformed existing benchmark algorithms in terms of predefined evaluation criteria with an overall 72% accuracy compared to benchmark algorithms which is 11 % only. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH by Siti Roslindar, Yaziz, Roslinazairimah, Zakaria

    Published 2018
    “…In evaluating the performance of the multistep ahead forecast, the proposed algorithm is employed to daily world gold price series of 5-year data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Since the 1960s, many algorithms for data classification have been proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan by Redzuan, Nur Amalina

    Published 2013
    “…The sentiment analysis in this project utilized 1000 newspaper’s sentences for the training and classification phase and testing data to evaluate the average of accurateness. The evaluation is made on three experiments which in Experiment I used 700 newspaper’s sentences as the training data and 300 newspaper’s sentences as the testing data. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Comparative Study Of Blockchain Algorithms For Non-Fungible Token by Woo, Jan Yin

    Published 2023
    “…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad by Saima Gulzar, Ahmad

    Published 2017
    “…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
    Get full text
    Get full text
    Get full text
    Thesis