Search Results - (( concern extraction method algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia by Jamaluddin, Jamhuri, Kamarudin, Norizah, Ismail, Mohd Hasmadi, Ahmad, Siti Azfanizam

    Published 2023
    “…Suitable extraction technique and the least cost while reducing the environmental impact is the primary concern in timber transportation planning in undulate topography. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Text based personality prediction from multiple social media data sources using pre-trained language model and model averaging by Christian, Hans, Suhartono, Derwin, Chowanda, Andry, Kamal Z., Zamli

    Published 2021
    “…Unlike earlier work which adopts a single social media data with open and close vocabulary extraction method, the proposed work uses multiple social media data sources namely Facebook and Twitter and produce a predictive model for each trait using bidirectional context feature combine with extraction method. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine by Fathi Mahdi Elsiddig Haroun, Mr.

    Published 2023
    “…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
    text::Thesis
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses principal component analysis (PCA) as a feature extraction method to extract 117 independent and discriminative features with 95% of variance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses by Sadrnia, Abdolhossein, Ismail, Napsiah, Mohd Ariffin, Mohd Khairol Anuar, Zulkifli, Norzima, Boyer, Omid

    Published 2014
    “…Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Fusion of moment invariant method and deep learning algorithm for COVID-19 classification by Ervin Gubin Moung, Chong, Joon Hou, Maisarah Mohd Sufian, Mohd Hanafi Ahmad Hijazi, Jamal Ahmad Dargham, Sigeru Omatu

    Published 2021
    “…This paper proposes a fusion of a moment invariant (MI) method and a DL algorithm for feature extraction to address the instabilities in the existing COVID-19 classification models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Property premises intruders detection using face recognition method / Joveni Henry by Joveni Henry

    Published 2017
    “…Therefore, this project emphasize strongly on developing a system that can detect intruders of property premises by using the face recognition method. This project will focus mainly on the Viola-Jones algorithm for face and facial parts detection, facial geometry distance measure for feature extraction and Similarity Measure algorithm using the Euclidian Distance to perform face recognition. …”
    Get full text
    Get full text
    Thesis
  11. 11

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Modeling of road geometry and traffic accidents by hierarchical object-based and deep learning methods using laser scanning data by Sameen, Maher Ibrahim

    Published 2018
    “…There was a need for efficient segmentation algorithm, optimization strategy, feature extraction and classification, and robust statistical and computational intelligence models to accomplish the set aims. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Social networks content analysis for peacebuilding application by Shaikh, Muniba, Salleh, Norsaremah, Abdullah, Lili Marziana

    Published 2015
    “…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Trajectory planning and simulation for 3d printing process by Ng, Chin Yong

    Published 2022
    “…The slicing method used is basic slicing. The slicing algorithm consists of two sections: intersection point tracking algorithm and contour creation algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…Finally, mathematical experimentation is proceeded concerning on verification and validation of the new algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis by Nor Farawahida Abdullah, Nur Haizum Abd Rahman

    Published 2025
    “…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    An integrated deep learning deepfakes detection method (IDL-DDM) by Yassin, Warusia, Johan, Azwan, Abas, Zuraida Abal, Baharon, Mohd Rizuan, Bejuri, Wan, Ismail, Anuar

    Published 2024
    “…Consequently, such manipulation via intelligent algorithm contributes to more crucial circumstances as electronic media integrity become a challenging concern. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    PREDICTIVE MAXIMUM POWER POINT TRACKING (MPPT) ALGORITHM FOR PERMANENT EXCHANGE MEMBRANE FUEL CELL (PEMFC) by MOHD RIZZWAN, MINGGU

    Published 2022
    “…A comparison of PEMFC performances based on the proposed technique with other existing MPPT algorithms will be done to validate the algorithm performance. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images by Jamaludin, Shahrizan, Mohamad Ayob, Ahmad Faisal, Mohd Norzeli, Syamimi, Mohamed, Saiful Bahri

    Published 2022
    “…Next, the adaptive initial contour (AIC), δ, and stopping function were integrated to create the adaptive Chan-Vese active contour (ACVAC) algorithm. Finally, the partly -normalization method for normalization and feature extraction was designed by selecting the most prominent iris features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Characterization of PV panel and global optimization of its model parameters using genetic algorithm by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…This paper details an improved modeling technique for a photovoltaic (PV) module; utilizing the optimization ability of a genetic algorithm, with different parameters of the PV module being computed via this approach. …”
    Article