Search Results - (( rule extraction function algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid subjective evaluation of rule Exraction Algorithm using Weighted Subsethood-Based (WSBA) by Othman, Mahmod, Ku-Mahamud, Ku Ruhana, Hawani, Shezrin, Hamzah, Amir, Khalid, Shaiful Annuar, Abdullah, Fader

    Published 2013
    “…Fuzzy rules are important elements that being highlighted in any fuzzy expert system.This research proposes the framework of subjective performance evaluation using fuzzy technique for ranking the performance of the financial performance of a company under a multi criteria environment.There are a lot of techniques used such as fuzzy similarity function, fuzzy synthetic decision and satisfaction function have been adopted.The framework is based on fuzzy multi-criteria decision-making that consists of fuzzy rules.The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm by Othman, Mahmod, Khalid, Shaiful Annuar, Abdullah, Fader, Amir Hamzah, Shezrin Hawani, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Self learning neuro-fuzzy modeling using hybrid genetic probabilistic approach for engine air/fuel ratio prediction by Al-Himyari, Bayadir Abbas

    Published 2017
    “…An enhanced hybrid Genetic Algorithm based Fuzzy Bayesian classifier (GA-FBC) was proposed to help the NFS in the rule extraction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…However, in the event of having multiple variables coupled with a few features, the classification problem will be getting more sophisticated, as a result human expert may not be able to derive proper rules. This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
    Article
  13. 13

    Rule extraction from multi-layer perceptron neural network using decision tree for currency exchange rates forecasting by Soleh, Ardiansyah

    Published 2015
    “…This study has shown how rule can be extracted from MLP network by decision tree without making any assumptions about the networks activations function or having initial knowledge about the problem domain. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan by Maizan, Putri Nur Syarfa

    Published 2020
    “…In this system, Forward Chaining in Rule-Based algorithm is used to filter user’s preferences and Web-Scraping technique is used to extract data and information from websites. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The extraction of minimum rules operation is conducted after the default rules have been generated in order to obtain the most useful discovered rules. …”
    Get full text
    Get full text
    Thesis
  18. 18

    New Learning Models for Generating Classification Rules Based on Rough Set Approach by Al Shalabi, Luai Abdel Lateef

    Published 2000
    “…Classification rules were generated based on the best reduct. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…In addition, no stemming algorithm has been proposed for extracting Pashto root words from the Pashto corpus, which is applicable for the above mentioned functions. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Euclidean space data projection classifier with cartesian genetic programming (CGP) by WK Wong, Gopal Lenin, Tan, Terence, Ali Chekima

    Published 2018
    “…The data projection functions were evolved using CGP for 1000 generations before stopping to extract the best functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article