Search Results - (( java implementation models algorithm ) OR ( programming program bayes algorithm ))
Search alternatives:
- implementation models »
- java implementation »
- programming program »
- models algorithm »
- bayes algorithm »
- program bayes »
-
1
-
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
3
Classification Algorithms to Determine Students’ Specialization in a Higher Education Institution
Published 2023“…After that, we looked at how Python programming classification algorithms like Support Vector Machine (SVM), Naïve Bayes, Random Forest, and Decision Tree performed in classifying the areas of specialization of the students. …”
Get full text
Get full text
Get full text
Article -
4
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…In this system, the layout was designed under two categories which are the standard bay size and the small bay size to increase the parking bays. …”
Get full text
Get full text
Thesis -
5
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
6
Divorce prediction using Naive Bayes / Alia Hannani Ahmad Bakri
Published 2024Get full text
Get full text
Thesis -
7
Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat
Published 2022“…This work investigates the suitability and effectiveness of machine learning algorithms such as Multinomial Naive Bayes, KNN, Logistic Regression, Decision Tree for predicting levels of arousal intensity among the programmers and LSTM deep learning algorithm to classify the programmers according to their performance. …”
Get full text
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…Multilayer Perceptron algorithm has been the best algorithm with the highest success percentage in both of the programs; Decision Trees has been the algorithm which has the lowest success percentage again in both of the programs. …”
Get full text
Get full text
Get full text
Article -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
14
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
15
Car recognition using Bayes Classifier / Nur Atiqah Mat Samadi
Published 2017Get full text
Get full text
Thesis -
16
-
17
-
18
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
19
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
