Search Results - (( software classifications using algorithm ) OR ( java application design algorithm ))
Search alternatives:
- software classifications »
- classifications using »
- application design »
- java application »
- design algorithm »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Software Classification Using Structure-Based Descriptors
Published 2009“…Based on the undertaken experiment, the IBK algorithm is noted to generate the highest classification accuracy (74.8%) compared to several other algorithms provided in the Weka tool. …”
Get full text
Get full text
Get full text
Thesis -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Software defect prediction framework based on hybrid metaheuristic optimization methods
Published 2015“…For the purpose of this study, ten classification algorithms have been selected. The selection aims at achieving a balance between established classification algorithms used in software defect prediction. …”
Get full text
Get full text
Get full text
Thesis -
6
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
GOS: a Genetic OverSampling Algorithm for classification of Quranic verses
Published 2022Get full text
Get full text
Get full text
Proceeding Paper -
9
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024Get full text
Get full text
Get full text
Article -
10
Using the bees algorithm to optimise a support vector machine for wood defect classification
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
12
-
13
-
14
Cross-project software defect prediction
Published 2022“…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
Get full text
Get full text
Article -
15
-
16
The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…This study aims to evaluate the effectiveness of open-source software algorithms for ground classification in lidar point clouds and the subsequent generation of accurate DTMs. …”
Get full text
Get full text
Student Project -
18
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
19
-
20
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item
