Search Results - (( java implementation models algorithm ) OR ( quality classification mining algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
    Get full text
    Get full text
    Citation Index Journal
  4. 4

    Graduates employment classification using data mining approach by Ab Aziz, Mohd Tajul Rizal, Yusof, Yuhanis

    Published 2016
    “…Data Mining is a platform to extract hidden knowledge in a collection of data.This study investigates the suitable classification model to classify graduates employment for one of the MARA Professional College (KPM) in Malaysia.The aim is to classify the graduates into either as employed, unemployed or further study.Five data mining algorithms offered in WEKA were used; Naïve Bayes, Logistic regression, Multilayer perceptron, k-nearest neighbor and Decision tree J48.Based on the obtained result, it is learned that the Logistic regression produces the highest classification accuracy which is at 92.5%. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  8. 8

    Estimating 1-MCP application for Kampuchea guava with data mining technology by Ding, Phebe, Khor, Kor Chin

    Published 2018
    “…In this preliminary study, data mining (DM) technology was utilized to achieve fast estimation of 1-MCP application based on different qualities of 'Kampuchea' Guava. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…With closed itemset mining already being a preferred choice for complexity and redundancy reduction during rule generation, this study has further confirmed that overall closed itemset based association rules are also of better quality in terms of classification precision and recall, and precision and recall on individual class examples. …”
    Get full text
    Get full text
    Article
  10. 10

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Various classification algorithms have been developed to produce classification models with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Improved building roof type classification using correlation-based feature selection and gain ratio algorithms by Norman, M., Mohd Shafri, Helmi Zulhaidi, Pradhan, Biswajeet, Yusuf, B.

    Published 2017
    “…Of late, application of data mining for pattern recognition and feature classification is fast becoming an essential technique in remote sensing research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Combining cluster quality index and supervised learning to predict students’ academic performance by Suhaila Zainudin, Rapi’ah Ibrahim, Hafiz Mohd Sarim

    Published 2024
    “…This study employs a combination of data mining tasks, such as clustering and classification, to undertake the prediction task. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Book Chapter
  20. 20

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project