Search Results - (( opening classification rules algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- opening classification »
- classification rules »
- java application »
- rules algorithm »
-
1
-
2
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…Based on the experiment results, the classification method using the TIP approach has successfully performed rules generation and classification tasks as required during a classification operation. …”
Get full text
Get full text
Thesis -
3
Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman
Published 2024“…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
Get full text
Get full text
Article -
4
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. …”
Get full text
Get full text
Thesis -
5
Framework for mining XML format business process log data
Published 2024Get full text
Get full text
Thesis -
6
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…This research focuses on improving the prediction of the next visited web pages and introduces them to current anonymous user. An enhanced classification algorithm is used to assign the current anonymous user to the best web navigation profile. …”
Get full text
Get full text
Thesis -
7
-
8
Projecting named entity tags from a resource rich language to a resource poor language
Published 2012“…The method computes the string similarity between the English words and the list of available lexemes in a pre-built lexicon that approximates the best NE mapping.The algorithm has been effectively evaluated using our own terrorism tagged corpus; it achieved satisfactory results in terms of precision, recall, and F-measure.An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Get full text
Article -
9
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
10
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
11
Projecting named entity tags from a resource rich language to a resource poor language
Published 2013“…An evaluation of the selected open source NER tool for English is also presented.…”
Get full text
Get full text
Article -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
13
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
