Search Results - (( developing activation conversion algorithm ) OR ( java extraction method algorithm ))
Search alternatives:
- developing activation »
- conversion algorithm »
- extraction method »
- method algorithm »
- java extraction »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
3
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…The formal rules from Dewan Bahasa & Pustaka (DBP) are used as the primary reference for generating the short form word identification algorithm. While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
8
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report -
9
A flowchart-based multi-agent system for assisting novice programmers with problem solving activities
Published 2023“…The results also show that an automatic text-to-flowchart conversion approach applied in FMAS successfully motivated nearly all participants in problem solving activities. …”
Article -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…Recent research has focused on analysing Android Intent in the XML file. We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
11
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
12
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The data collected for this machine learning model is using the statistically significant features from vibration and acoustic analysis. The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
13
Direct Tuning Phase-Shift Angle In Dab Dc-Dc Converter Using Moth Flame Optimization (Mfo) Algorithm
Published 2022“…Besides, the non-isolated bidirectional power flow has restrictions in high voltage conversion gain, safety and power quality. Therefore, a 100 kW isolated bidirectional Dual Active Bridge (DAB) DC-DC converter with single phase shift (SPS) modulation have been developed using MATLAB/Simulink software. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Catalytic conversion of methane and carbon dioxide in conventional fixed bed and dielectric barrier discharge plasma reactors
Published 2006“…The purpose of this study is to develop a new catalytic process for CH4 and CO2 utilization to produce C2 hydrocarbons and/or synthesis gas at high conversion and selectivity. …”
Get full text
Get full text
Thesis -
15
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
16
VOICE MODIFICATION USING DIGITAL TECHNOLOGY
Published 2004“…The project's major activities are to develop programs using MATLAB, that enable speech signal recording, analysis, synthesis, modification, and conversion. …”
Get full text
Get full text
Final Year Project -
17
-
18
Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini
Published 2023“…For the recognized sign language gesture, the algorithm creates a bounding box with a label. The hand signs are then translated into words, allowing medical staff to clearly understand the conversation. …”
Get full text
Get full text
Thesis -
19
High performance enzyme-catalyzed synthesis and characterization of a nonionic surfactant
Published 2013“…Both developed models have shown good quality predictions in terms of the conversion of xylitol caprate with a high R2 (>0.9) and a low mean square error (MSE). …”
Get full text
Get full text
Get full text
Article -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article
