Search Results - (( java implementation tree algorithm ) OR ( pattern string based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2
  3. 3

    A novel secret key generation based on image link by Sulaiman A.H., Al-Shaikhli I.F.T., Wahiddin M.R., Houri S., Jamil N., Ismail A.F.

    Published 2023
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Article
  4. 4

    A novel secret key generation based on image link by Sulaiman, Alyaa Ghanim, Taha Alshaikhli, Imad Fakhri, Wahiddin, Mohamed Ridza, Houri, S, Jamil, Norziana, Ismail, Ahmad Fadzil

    Published 2018
    “…While, the key is generated based on a provided image link, starting pattern and string length which must be kept in secret as the algorithm is publicly known. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Ensemble based categorization and adaptive model for malware detection by Ahmad Zabidi, Muhammad Najmi, Maarof, Mohd Aizaini, Zainal, Anazida

    Published 2011
    “…Current malware detection method involved string search algorithm which based on the pattern detection. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In word segmentation, related algorithms can be divided into three categories: based on string matching, based on understand and based on statistics [1]. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Meta search engine powered by DBpedia by Chin, Kim On, Patricia Anthony, Boo, Vooi Keong, Rosalam Sarbatly

    Published 2012
    “…The disambiguation that exists between several terms gives challenge on how a search engine should produce a search result since traditional search engines work based on pattern matching rather than the meaning of the term being queried. …”
    Get full text
    Get full text
    Research Report
  14. 14

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph