Search Results - (( java implementation tree algorithm ) OR ( filing implementation learning algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The following research report focuses on the implementation of classification machine learning methods for detecting malware. …”
    Get full text
    Get full text
    Article
  12. 12

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
    thesis::doctoral thesis
  13. 13

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim by Halim, Zulkifli

    Published 2023
    “…The global trend in the CCRA study shows that implementing machine learning and deep learning techniques is expanding rapidly. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…In the first phase, the ontology element and algorithm techniques should be selected. While in the second phase, the HTML files are uploaded for processing. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Chinese character recognition using neural network / Low Poh Tian by Low, Poh Tian

    Published 2003
    “…The training parameters of the network i.e. the learning rate and momentum has both fixed to 0.6. The extracted image data is then feed into the network, the weights of which are modified by error-backpropagation algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20