Search Results - (( code classification matching algorithm ) OR ( java constructing machine algorithm ))
Search alternatives:
- classification matching »
- constructing machine »
- code classification »
- java constructing »
- machine algorithm »
-
1
-
2
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…For next, instead of k-means clustring, Fuzzy cmeans clustering is combined with Spatial Pyramid Matching image representation to improve the accuracy of classification results. …”
Get full text
Get full text
Thesis -
5
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…Each of these chatbots focuses on different programming concepts or constructs. These chatbots support learning of Java via problem-solving steps through “learning by doing”. …”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
7
Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali
Published 2016“…The subsequent step is using the DAUB3 wavelet transform for feature extraction along with the application of an additional step for biometric template security that is the Non-invertible transform (cancelable biometrics method) and finally utilizing the Support Vector Machine (Non-linear Quadratic kernel) for matching/classification. The experimental results showed that the recognition rate achieved are of 99.9% on Bath-A data set, with a maximum decision criterion of 0.97.…”
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis
