Search Results - (( java application means algorithm ) OR ( variable learning graph algorithm ))
Search alternatives:
- application means »
- java application »
- means algorithm »
- graph algorithm »
- learning graph »
- variable »
-
1
An improved directed random walk framework for cancer classification using gene expression data
Published 2020“…Sub-algorithms of SDW can be further divided into data pre-processing phase, specific tuning parameter selection, weight as additional variable, and exclusion of unwanted adjacency matrix. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
A case study on quality of sleep and health using Bayesian networks
Published 2012“…There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
Get full text
Article -
4
-
5
DeMI interface tool for profit estimation and waste conversion technology recommendations in enhancing municipal solid waste management
Published 2024“…This state-of-the-art tool seamlessly combines process network synthesis and machine learning, using the Process Graph (P-graph) and the Waikato Environment for Knowledge Analysis (WEKA) software tools. …”
Get full text
Get full text
Get full text
Article -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
7
Determining malaria risk factors in Abuja, Nigeria using various statistical approaches
Published 2018“…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
Get full text
Get full text
Thesis -
8
Revolutionizing video analytics: a review of action recognition using 3D
Published 2024“…This paper provides an overview of recent research in 3D video action recognition, concentrating on different deep learning architectures, self-supervised learning, graph-based methods, fewshot and zero-shot learning, cross-modal action understanding, and model interpretability. …”
Get full text
Get full text
Article -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Improving Classification Accuracy of Scikit-learn Classifiers with Discrete Fuzzy Interval Values
Published 2020“…Understanding machine learning (ML) algorithm from scratch is time consuming. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Enhancing understanding of programming concepts through physical games
Published 2017“…We produced in total 10 lesson games to illustrate variables, swapping, arrays, sorting algorithm particularly bubble sort, quicksort, selection sort, graph theory, dynamic programming, amortized analysis and trees. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
16
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
18
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis
