Search Results - (( java implementation models algorithm ) OR ( using naive process algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Text Categorization Using Naive Bayes Algorithm by Wan Hazimah, Wan Ismail

    Published 2005
    “…The aims of this project are to categorize the textual document using naive Bayes algorithm and to measure the correctness of the chosen technique for the categorization process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Text categorization using naive bayes algorithm by Wan lsmail @ W. Abdullah, Wan Hazimah, Kamaruddin, Siti Sakira, Sainin, Mohd Shamrie

    Published 2006
    “…The aims of this project are to categorize the textual document using naive Bayes algorithm and to measure the correctness of the chosen technique for the categorization process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour by Pebrianti, Dwi, Ariawan, Angga, Bayuaji, Luhur, Mahdiana, Deni, ,, Rusdah

    Published 2022
    “…The single Classifier test with the Naïve Bayes algorithm produces the highest accuracy value of 72.7%, while using k-NN algorithm is 81.5%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Naive bayes-guided bat algorithm for feature selection. by Taha, Ahmed Majid, Mustapha, Aida, Chen, Soong Der

    Published 2013
    “…The performance of the proposed feature selection algorithm was investigated using twelve benchmark datasets from different domains and was compared to three other well-known feature selection algorithms. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak by Ishak, Najihah Salsabila

    Published 2021
    “…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    PREDICTION OF HFMD DISEASE OUTBREAK FROM TWITTER by Tay, Guo Hong

    Published 2019
    “…This is because both Naive Bayes and SVM are baseline algorithm used in text classification. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  15. 15

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…This project implements the Naive Bayes algorithm as the classification algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Text classification using Naive Bayes: An experiment to conference paper by Sainin, Mohd Shamrie

    Published 2005
    “…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…There are many Rough Set discretization technique that can be used, among of them are Semi Naives and Equal Frequency Binning.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item