Search Results - (( based computing data algorithm ) OR ( ((java implication) OR (_ implication)) based algorithm ))
Search alternatives:
- java implication »
- based computing »
- computing data »
- data algorithm »
- _ implication »
-
1
-
2
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…Therefore, this article presents a bibliometric analysis based on the topic of the root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Organizational Culture Automated Audit System (OCAAS)
Published 2017“…Several state of the art technologies and techniques were used to design and developed OCAAS which include the use of machine learning and sentiment analysis based novel opinion mining algorithms for electronic opinion analysis and computerized statistics based mathematical algorithms for electronic data analysis as well as MySQL database integration for faster data processing and cognitive ergonomics system interface for user friendly interface navigation.…”
Get full text
Get full text
Get full text
Thesis -
4
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…Overall, this thesis presents five contributions: the proposed modified word vectors algorithm, the new contextual classification dataset named QCoC, the efficient question-type classifier based on the feed-forward neural network algorithm, the potential transferability of the presented work to other domains, and the practical implications of the presented work towards cases where computational resources are limited or costly.…”
Get full text
Get full text
Get full text
Thesis -
5
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
6
Detection of mental disorders based on the analysis of emotion, facial expressions and facial movements in a video stream
Published 2025“…This paper explores individual differences in emotion expression and facial expressions for recognizing mental disorders based on video streaming. Using machine learning techniques and deep learning algorithms, we aim to create an algorithm for emotion recognition using a personalized approach. …”
Get full text
Get full text
Get full text
Article -
7
Gender classification on skeletal remains: efficiency of metaheuristic algorithm method and optimized back propagation neural network
Published 2020“…Thus, this paper proposed metaheuristic algorithms such as Particle Swarm Optimization, Ant Colony Algorithm and Harmony Search Algorithm based feature selection to identify the most significant features of skeleton remains. …”
Get full text
Get full text
Get full text
Article -
8
A hybrid deep learning-based unsupervised anomaly detection in high dimensional data
Published 2022“…However, Adamax optimization algorithm showed the best results when employed to train the DANN model. …”
Get full text
Get full text
Article -
9
Temporal - spatial recognizer for multi-label data
Published 2018“…Hence, there is a need for a recognition algorithm that can separate the overlapping data points in order to recognize the correct pattern. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights
Published 2024“…This study aims to identify customer loyalty patterns in the Malaysian coffee market, focusing on the Malaysia Starbucks customer survey dataset. Using clustering algorithms such as KMeans, KMeans with Principal Component Analysis (PCA), single linkage, complete linkage, DBScan, and DBScan in conjunction with PCA, we identify distinct customer segments based on loyalty patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Quantum-Resistant Cryptography in Cyber Security
Published 2025“…It provides a systematic overview of major post-quantum cryptographic families, including lattice-based, hash-based, code-based, multivariate, and isogeny-related schemes, and evaluates their current security assumptions, practical efficiency, and readiness for real-world deployment. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
Get full text
Get full text
Article -
13
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…A user-friendly desktop system is created for input of facial photos and receiving immediate age estimation results, illustrating machine learning's assure in age identification. With implications for personalised services and security, this experiment demonstrates how CNN algorithms improve accuracy, adding to successful age-related technology.…”
Get full text
Get full text
Thesis -
14
-
15
Parallel strategies on a distributed parallel computer system
Published 2004“…There are IADEI method which is based on Richardson's formula and AGE\_BRIAN which is based on linear interpolation concept. …”
Get full text
Get full text
Monograph -
16
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…On the other hand maximal itemset based association rules, that are a subset of closed itemset based rules, show to be insufficient in this regard, and typically will have worse recall and generalization power. …”
Get full text
Get full text
Article -
17
An efficient unknown detection approach for RFID data stream management system
Published 2025“…This research addresses the critical issue of detecting unknown tags, focusing on optimizing processing time and energy efficiency in terms of memory usage when detecting these tags. A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
18
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Get full text
Thesis -
19
Innovating communication adaptation on social media using AI-based decision support systems
Published 2025“…This study explores the role of AI-based decision support systems in innovating how social media users adapt their communication styles to diverse contexts and audiences. …”
Get full text
Get full text
Get full text
Article -
20
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…It combines the benefits of computer vision and fuzzy set theory based on fuzzy BK subproduct. …”
Get full text
Get full text
Thesis
