Search Results - (( learning effectiveness tree algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    An Intelligent Data-Driven Approach for Electrical Energy Load Management Using Machine Learning Algorithms by Akhtar, Shamim, Muhamad Zahim, Sujod, Rizvi, Syed Sajjad Hussain

    Published 2022
    “…This is grounded in the fact that Bagged Trees is most effective algorithm for the said application and Medium Trees is the most efficient one. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  8. 8

    A Hybrid Gini PSO-SVM Feature Selection: An Empirical Study of Population Sizes on Different Classifier by Noormadinah Allias, Megat NorulAzmi Megat Mohamed Noor, Mohd. Nazri Ismail, Kim de Silva, (UniKL MIIT)

    Published 2014
    “…Deriving from previous experiments, we extended our work by investigating the effect of population sizes from our proposed method of feature selection on different learning classifier algorithms using Random Forest, Voting, Decision Tree, Support Vector Machine and Stacking. …”
  9. 9

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…This study recommends a selection trade-off as the function of prediction efficiency and efficacy of the algorithm. Particularly, the proposed optimized Bagged Trees are the most effective algorithm for energy demand prediction applications, and the proposed optimized Medium Trees are the most efficient algorithm for real-time systems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Machine learning in predicting anti-money laundering compliance with protection motivation theory among professional accountants by Masrom, S., Tarmizi, M.A., Halid, S., Rahman, R.A., Abd Rahman, A.S., Ibrahim, R.

    Published 2023
    “…The research elaborates on the design and implementation of machine learning models based on three algorithms: Decision Tree, Gradient Boosted Tree, and Support Vector Machine. …”
    Get full text
    Get full text
    Article
  12. 12

    Detection and classification of conflict flows in SDN using machine learning algorithms by Mutaz Hamed Hussien Khairi, Sharifah Hafizah Syed Ariffin, Nurul Mu'azzah Abdul Latiff, Kamaludin Mohamad Yusof, Mohamed Khalafalla Hassan, Fahad Taha Al-Dhief, Mosab Hamda, Suleman Khan, Muzaffar Hamzah

    Published 2021
    “…As a result, this paper presents several machine learning algorithms that include Decision Tree (DT), Support Vector Machine (SVM), Extremely Fast Decision Tree (EFDT) and Hybrid (DT-SVM) for detecting and classifying conflicting flows in SDNs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A class skew-insensitive ACO-based decision tree algorithm for imbalanced data sets by Mohd Razali, Muhamad Hasbullah, Saian, Rizauddin, Yap, Bee Wah, Ku-Mahamud, Ku Ruhana

    Published 2021
    “…This study proposed an enhanced algorithm called hellingerant-tree-miner (HATM) which is inspired by ant colony optimization (ACO) metaheuristic for imbalanced learning using decision tree classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Interaction effect of process parameters and Pd-electrocatalyst in formic acid electro-oxidation for fuel cell applications: Implementing supervised machine learning algorithms by Hossain S.K.S., Ali S.S., Rushd S., Ayodele B.V., Cheng C.K.

    Published 2023
    “…Carbon nanotubes; Electrocatalysts; Electrooxidation; Forestry; Formic acid; Gaussian distribution; Learning algorithms; Palladium; Parameter estimation; Regression analysis; Support vector machines; Formic acid electrooxidation; Fuel cell application; Gaussian kernel functions; Gaussian process regression; Interaction effect; Machine learning algorithms; Performance; Process parameters; Regression trees; Support vector machine regressions; Sensitivity analysis…”
    Article
  15. 15

    Waste management using machine learning and deep learning algorithms by Sami, Khan Nasik, Amin, Zian Md Afique, Hassan, Raini

    Published 2020
    “…For our research we did the comparisons between three Machine Learning algorithms, namely Support Vector Machine (SVM), Random Forest, and Decision Tree, and one Deep Learning algorithm called Convolutional Neural Network (CNN), to find the optimal algorithm that best fits for the waste classification solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers