Search Results - (( developing human function algorithm ) OR ( java data extraction algorithm ))
Search alternatives:
- extraction algorithm »
- function algorithm »
- developing human »
- human function »
- java »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Mapreduce algorithm for weather dataset
Published 2017“…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Thesis -
3
MapReduce algorithm for weather dataset
Published 2018“…The temperature, humidity and visibility attributes from the dataset has been extracted by the MapReduce Algorithm into structure data. …”
Get full text
Get full text
Research Report -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Sentiment Analysis is a field that deals with the problem of identifying and extracting sentiment (or opinion) from data (particularly textual data). …”
Get full text
Get full text
Get full text
Thesis -
5
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019“…This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
8
-
9
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
Get full text
Get full text
Thesis -
10
Songs Search Using Human Humming Voice
Published 2007“…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. …”
Get full text
Get full text
Final Year Project -
11
Implementation and Optimization of Human Tracking System Using ARM Embedded Platform
Published 2012“…Functions and library in OpenCV which developed by Intel Corporation was utilized for building the human tracking algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
12
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. …”
Get full text
Get full text
Monograph -
13
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019“…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
15
SRcS: Smartphone Recommendation System using genetic algorithm / Nursalsabiela Affendy Azam
Published 2020“…Thus, the objective of the system is to design and develop a progressive web application (PWA) recommendation system for purchasing a smartphone by using genetic algorithm and test the system functionality. …”
Get full text
Get full text
Thesis -
16
MOTION PLANNING ALGORITHM FOR VEHICLE PARKING SIMULATION
Published 2008“…Intelligence of the system means that the car is capable of analyzing its own environment and act accordingly to it as a human being would do. This project focuses on creation of the motion planning algorithm of the system and developing a simulation to simulate the vehicle movements. …”
Get full text
Get full text
Final Year Project -
17
-
18
-
19
Application of minimax algorithm in dots and boxes game
Published 2025“…The research process included designing and developing a functional Dots and Boxes game prototype using C# and the Universal Windows Platform (UWP), featuring a user-friendly interface and customizable settings. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Get full text
Get full text
Article
