Search Results - (( java implementation level algorithm ) OR ( binary classification means algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Mohd Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2021
    “…Consequently, optimization algorithms including binary gravitation search algorithm (BGSA) and binary particle swarm optimization (BPSO), were employed to identify the optimal channels for gender classification. …”
    Get full text
    Get full text
    Article
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…Therefore, a clustering algorithm by introducing data transformation using X-means data splitting is proposed to investigate the spatial homogeneity of time series rainfall data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Classification of Cognitive Frailty in Elderly People from Blood Samples using Machine Learning by Idris, S., Badruddin, N.

    Published 2021
    “…A total of 7 different classification algorithms were used to predict between 6 levels of CF, the Robust and Non-Robust groups, as well as the Robust and Frail with MCI groups. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  9. 9

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Segmentation Assisted Object Distinction For Direct Volume Rendering by Irani, Arash Azim Zadeh

    Published 2013
    “…A set of image processing techniques are creatively employed in the design of K-means based hybrid segmentation algorithm.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    The identification of oreochromis niloticus feeding behaviour through the integration of photoelectric sensor and logistic regression classifier by Mohamad Radzi, Mohd Sojak, Mohd Azraai, Mohd Razman, Anwar, P. P. Abdul Majeed, Rabiu Muazu, Musa, Ahmad Shahrizan, Abdul Ghani, Ismed, Iskandar

    Published 2018
    “…The signals acquired from the sensors are converted into binary data. The hunger behaviour classes are determined through k-means clustering algorithm, i.e., satiated and unsatiated. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Enhanced extreme learning machine for general regression and classification tasks by Mahmood, Saif F

    Published 2020
    “…The method is developed for regression task by using mean/ median of ELM training errors which is then used as threshold for separating the training data and converting the continuous targets to binary. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid Neural Network With K-Means For Forecasting Response Candidate In Direct Marketing by Ramadhan, Rakhmat Sani

    Published 2014
    “…This research concerns on binary classification which is classified into two classes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An Optimized Semantic Segmentation Framework for Human Skin Detection by Huong, Audrey, Ngu, Xavier

    Published 2024
    “…The model produced satisfactory performances even with a strict split of 50 %, confirming the high efficiency of the proposed framework. The mean Jaccard index and Dice similarity measures evaluated between the annotated and predicted mask ranged from 0.80 to 0.93 in the binary classification of pixels as “skin” versus “background”. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of compound clustering techniques using hybrid soft-computing algorithms by Salim, Naomie, Shamsuddin, Siti Mariyam, Salleh @ Sallehuddin, Roselina, Alwee, Razana

    Published 2006
    “…However, their performance is slightly inferior to that of support vector machines for binary classification of chemical structures into drug and non drug compounds.…”
    Get full text
    Get full text
    Monograph
  18. 18

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa by Md Isa, Amalina Izzati

    Published 2018
    “…Inclusive with the design of UFLS is a new module referred as Load Shedding Module (LSM). Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Assessment of predictive models for chlorophyll-a concentration of a tropical lake. by Malek, S., Syed Ahmad, S. M., Singh, S. K., Milow, P., Salleh, A.

    Published 2011
    “…RMSE is based on the level of error of prediction whereas AUC is based on binary classification task. CONCLUSIONS: Overall, HEA produced the best performance in terms of RMSE, r, and AUC values. …”
    Get full text
    Get full text
    Article