Search Results - (( data classification matching algorithm ) OR ( java implementation models algorithm ))

Refine Results
  1. 1

    Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm by Nurcahyawati, Vivine, Mustaffa, Zuriani

    Published 2023
    “…High dimensionality in data sets is one of the challenges faced in classification, data mining, and sentiment analysis. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Trademark image classification approaches using neural network and rough set theory by Saad, Puteh

    Published 2003
    “…The approaches contain five major stages, namely: image acquisition, image preprocessing, feature extraction, data transformation and classification. Feature normalization and data discretization techniques are utilized to perform the data transformation phase. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Converged Classification Network For Matching Cost Computation by Hamid, Mohd Saad, Abd Manap, Nurulfajar, Hamzah, Rostam Affendi, Kadmin, Ahmad Fauzan

    Published 2020
    “…The stereo matching algorithm capable of producing the disparity or depth map in computer. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Training data selection for record linkage classification by Zaturrawiah Ali Omar, Zamira Hasanah Zamzuri, Noratiqah Mohd Ariff, Mohd Aftar Abu Bakar

    Published 2023
    “…The top and imbalanced construction was found to be the most effective in producing training data with 100% correct labels. Random forest and support vector machine classification algorithms were compared, and random forest with the top and imbalanced construction produced an F1 -score comparable to probabilistic record linkage using the expectation maximisation algorithm and EpiLink. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…Rough sets theory represents a mathematical approach to vagueness and uncertainty. Data analysis, data reduction, approxi mate classification, machine learning, and discovery of pattern in data are functions performed by a rough sets analysis. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
    Get full text
    Get full text
    Proceeding
  10. 10

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The lowest biometric errors of false non-match rate and false match rate are decreased to about 6.19% and 1.79%, respectively on the KPCA data set.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…In order to utilize the supervised classification algorithms without consuming a lot of time for labeling data manually, a two step method which selects the training data automatically has been proposed in previous studies. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…It is designed to incorporate with the CAPSOCA algorithm which intended to strengthen the classification outcomes. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR by Mohd Shah, Hairol Nizam, Ab Rashid, Mohd Zamzuri, Mohd Sobran, Nur Maisarah

    Published 2013
    “…Then classification algorithm is applied to find the centroid of the human. …”
    Get full text
    Get full text
    Article
  20. 20