Search Results - (( quality classification mining algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1
  2. 2

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
    Get full text
    Get full text
    Citation Index Journal
  3. 3

    Graduates employment classification using data mining approach by Ab Aziz, Mohd Tajul Rizal, Yusof, Yuhanis

    Published 2016
    “…Data Mining is a platform to extract hidden knowledge in a collection of data.This study investigates the suitable classification model to classify graduates employment for one of the MARA Professional College (KPM) in Malaysia.The aim is to classify the graduates into either as employed, unemployed or further study.Five data mining algorithms offered in WEKA were used; Naïve Bayes, Logistic regression, Multilayer perceptron, k-nearest neighbor and Decision tree J48.Based on the obtained result, it is learned that the Logistic regression produces the highest classification accuracy which is at 92.5%. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer by Tuerxun, Adilijiang

    Published 2017
    “…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Estimating 1-MCP application for Kampuchea guava with data mining technology by Ding, Phebe, Khor, Kor Chin

    Published 2018
    “…In this preliminary study, data mining (DM) technology was utilized to achieve fast estimation of 1-MCP application based on different qualities of 'Kampuchea' Guava. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Evaluation and optimization of frequent, closed and maximal association rule based classification by Mohd Shaharanee, Izwan Nizal, Hadzic, Fedja

    Published 2014
    “…With closed itemset mining already being a preferred choice for complexity and redundancy reduction during rule generation, this study has further confirmed that overall closed itemset based association rules are also of better quality in terms of classification precision and recall, and precision and recall on individual class examples. …”
    Get full text
    Get full text
    Article
  8. 8

    An adaptive ant colony optimization algorithm for rule-based classification by Al-Behadili, Hayder Naser Khraibet

    Published 2020
    “…Various classification algorithms have been developed to produce classification models with high accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Improved building roof type classification using correlation-based feature selection and gain ratio algorithms by Norman, M., Mohd Shafri, Helmi Zulhaidi, Pradhan, Biswajeet, Yusuf, B.

    Published 2017
    “…Of late, application of data mining for pattern recognition and feature classification is fast becoming an essential technique in remote sensing research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Combining cluster quality index and supervised learning to predict students’ academic performance by Suhaila Zainudin, Rapi’ah Ibrahim, Hafiz Mohd Sarim

    Published 2024
    “…This study employs a combination of data mining tasks, such as clustering and classification, to undertake the prediction task. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Rough set discretization: equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2017
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Rough set discretization: Equal frequency binning, entropy/MDL and semi naives algorithms of intrusion detection system by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Rough Set Discretization: Equal Frequency Binning, Entropy/MDL and Semi Naives Algorithms of Intrusion Detection System by Noor Suhana, Sulaiman, Rohani, Abu Bakar

    Published 2016
    “…Discretization part is also the crucial part resulting the good classification. Empirical results have shown that the quality of classification methods depends on the discretization algorithm in preprocessing step. …”
    Get full text
    Get full text
    Book Chapter
  17. 17

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis