Search Results - (( user evaluation tree algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- user evaluation »
- evaluation tree »
- using algorithm »
- tree algorithm »
-
1
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
2
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The project's objectives are to study the classifying approach of Google Play Store application reviews using the Decision Tree algorithm, develop a prototype of a classifying application program, and evaluate the accuracy model of the review classification program. …”
Get full text
Get full text
Article -
3
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
4
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The implementation phase focuses on the deployment of the Decision Tree algorithm and system evaluation through functionality testing. …”
Get full text
Get full text
Thesis -
5
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
6
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…These results proved that the algorithm and model, for syntactic tree output enhancement, are generalisable enough to be tested on other languages. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
-
9
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
10
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Plus, to analyse the efficiency of a detection model on keylogger dataset by evaluating a selection of attributes. Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. …”
Get full text
Get full text
Student Project -
11
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014“…In this work, new intelligent cooperative web caching approaches based on decision tree supervised machine learning algorithm are presented. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…The product is evaluated based on decision tree to determine whether the product need to order or vice versa. …”
Get full text
Get full text
Thesis -
13
-
14
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
15
A conceptual model for the E-commerce application recommendation framework using exploratory search
Published 2024journal::journal article -
16
Image Based Oil Palm Tree Crowns Detection
Published 2020“…This system the main features is to detect the crowns of oil palm tree by drawing circle on it and covers the feature of counting for every single detection that has been made as an evaluation to ensure the system is completely done. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Scalable rekeying algorithm in IEEE 802.16e
Published 2011“…This paper proposes a Scalable Rekeying Algorithm (SRA) based on a complete binary tree structure. …”
Get full text
Get full text
Conference or Workshop Item -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. …”
Get full text
Get full text
Get full text
Article -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
