Search Results - (( data extraction between algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- extraction between »
- between algorithm »
- implication based »
- java implication »
-
1
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
2
Fatigue data editing algorithm for automotive applications
Published 2005“…This paper presents a wavelet based algorithm to summa rise a long record of fatigue signal by extracting the bumps (fatigue damaging events) to produce a bump signal. …”
Get full text
Get full text
Article -
3
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…A critical step in developing such intelligent systems is the feature extraction process. Feature extraction is essential in classification, especially for data sources in the form of images. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
Get full text
Get full text
Article -
5
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
6
Chlorophyll-a mapping from the moderate resolution imaging spectroradiometer data in the South China Sea
Published 2005“…In this study, four different algorithms had been chosen to extract chlorophyll-a concentration from MODIS data in the South China Sea. …”
Get full text
Get full text
Conference or Workshop Item -
7
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…As the components of big data continue to expand, the task of extracting useful information becomes critical. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023Get full text
Get full text
Final Year Project Report / IMRAD -
10
Optimized clustering with modified K-means algorithm
Published 2021“…huge data is a big challenge. Clustering technique is able to find hidden patterns and to extract useful information from huge data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Handwriting recognition using webcam for data entry
Published 2014“…The outcome of the project should be able to obtain a system that is able to recognize handwritten numerical data with the lowest overshoot and errors. Several distinctive feature from each character is extracted using a few feature extraction methods, in which a comparison between three types of feature extraction modules were used. …”
Get full text
Get full text
Final Year Project -
12
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The second algorithm uses K Nearest Neighbour using a ratio of training data and testing data of 95:05 resulting in an accuracy value of 62%. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. Updated KDD CUP data set is formed and used during the training and testing phases, where this data set consists of mixed data traffics between attacks and normal activities. …”
Get full text
Get full text
Article -
14
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…Experimental results show that using our proposed IDS based on hybrid MOA-PSO technique provides more accuracy level compared to the use of ANN based on MOA, PSO and genetic algorithm. Updated KDD CUP data set is formed and used during the training and testing phases, where this data set consists of mixed data traffics between attacks and normal activities. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Classification for large number of variables with two imbalanced groups
Published 2020“…The difference between the two algorithms is in terms of the order of resampling and variable extraction prior to the construction of linear discriminant analysis (LDA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments
Published 2018“…Rapid growth of multimedia data in cyberspace caused a swift rise in data transmission volume. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of an effective clustering algorithm for older fallers
Published 2022“…A total of 1279 subjects and 9 variables were selected for clustering after the data pre-possessing stage. Using feature extraction with the t-SNE and the K-means clustering algorithm, subjects were clustered into low, intermediate A, intermediate B and high fall risk groups which corresponded with fall occurrence of 13%, 19%, 21% and 31% respectively. …”
Get full text
Get full text
Article -
18
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
Get full text
Get full text
Thesis -
19
AR oriented pose matching mechanism from motion capture data
Published 2023“…In order to extract the exact matched pose, the frame sequence is divided into pose feature frame and skeletal data frame by the use of pose matching dance training movement recognition algorithm (PMDTMR). …”
Article -
20
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
Published 2015“…In this report, the DCT watermarking algorithms and DWT watermarking algorithms were compared based on robustness and imperceptibility criteria. …”
Get full text
Get full text
Get full text
Get full text
Thesis
