Search Results - (( java application testing algorithm ) OR ( _ interactive ((rsa algorithm) OR (tree algorithm)) ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4
  5. 5
  6. 6

    A study of graduate on time (GOT) for Ph.D students using decision tree model by Chin, Wan Yung, Ch’ng, Chee Keong, Mohd Jamil, Jastini

    Published 2019
    “…Therefore, this study aims to classify the Ph.D students into the group of “GOT achiever” and “non-GOT achiever” by using decision tree models. Historical data that related to all Ph.D students in a public university in Malaysia has been obtained directly from the database of Graduate Academic Information System (GAIS) in order to develop and compare the performance of decision tree models (Chi-square algorithm, Gini index algorithm, Entropy algorithm and an interactive decision tree). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Detection of eye movements based on EEG signals and the SAX algorithm by Shanmuga, P. M. M., Lau, Sian Lun *, Jou, Chichang.

    Published 2018
    “…We would like to investigate another technique, namely the Symbolic Aggregate Approximation (SAX) algorithm, to find out its suitability and performance against known classification algorithms such as Support Vector Machine (SVM), k-Nearest Neighbour (KNN) and Decision Tree (DT).…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi

    Published 2014
    “…This algorithm provides a decision tree output to represent the knowledge model, enabled a faster classification of intra-urban classes, and disabled the subjectivities which are related to the interaction of the analyst. …”
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Interaction effect of process parameters and Pd-electrocatalyst in formic acid electro-oxidation for fuel cell applications: Implementing supervised machine learning algorithms by Hossain S.K.S., Ali S.S., Rushd S., Ayodele B.V., Cheng C.K.

    Published 2023
    “…Carbon nanotubes; Electrocatalysts; Electrooxidation; Forestry; Formic acid; Gaussian distribution; Learning algorithms; Palladium; Parameter estimation; Regression analysis; Support vector machines; Formic acid electrooxidation; Fuel cell application; Gaussian kernel functions; Gaussian process regression; Interaction effect; Machine learning algorithms; Performance; Process parameters; Regression trees; Support vector machine regressions; Sensitivity analysis…”
    Article
  12. 12

    A novel ensemble decision tree-based CHi-squared Automatic Interaction Detection (CHAID) and multivariate logistic regression models in landslide susceptibility mapping by Althuwaynee, Omar F., Pradhan, Biswajeet, Park, Hyuck Jin, Lee, Jung Hyun

    Published 2014
    “…An ensemble algorithm of data mining decision tree (DT)-based CHi-squared Automatic Interaction Detection (CHAID) is widely used for prediction analysis in variety of applications. …”
    Get full text
    Get full text
    Article
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18
  19. 19
  20. 20

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item