Search Results - (( developing intensive method algorithm ) OR ( java classification learning algorithm ))

Refine Results
  1. 1

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs by Soo , Say Leong

    Published 2006
    “…Finally. a defect segmentation algorithm was developed to segment the defects automatically from the image using background subtraction and rank leveling method.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Parallel Processing of RSAAlgorithm Using MPI Library by Wan Dagang, Wan Rahaya

    Published 2006
    “…This project is completed phase by phase and for the system development, the method used is evolutionary development approach. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Artificial neural network model for predicting windstorm intensity and the potential damages / Mohd Fatruz Bachok by Bachok, Mohd Fatruz

    Published 2019
    “…For the establishment of back-propagation algorithms, it does not only use Artificial Neural Network (ANN) model but also other techniques such as multiple regression analysis, dichotomous forecast method and error difference method. …”
    Get full text
    Get full text
    Thesis
  11. 11

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…To recognize and classify the level of jogging intensity, k-Nearest Neighbours (k-NN) algorithms will be considered as a machine learning method. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Face expression recognition using artificial neural network (ANN) / Mazuraini Ghani by Ghani, Mazuraini

    Published 2005
    “…In preprocessing phase, s detail studies and intensive experiments were conducted to obtain a suitable method of segmentation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Numerical Integration And Data Reduction For Application In Photometry by Chew, Tong Fatt

    Published 2003
    “…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…The performance of the algorithm is validated by using the developed database under four luminance intensities and achieved promising results. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm by Abdurrahim, Salem Hamed

    Published 2004
    “…Its Segmentation is problematic due to radio frequency inhomogeneity, caused by inaccuracies in the magnetic resonance scanner and by movement of the patient which produce intensity variation over the image, and that makes every segmentation method fail. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Future work should be focusing on data collection of the E-Nose sensors and the improvement of the learning algorithm robustness towards environmental noise during data acquisition, such as evaporation and contamination of odor samples.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development Of Automatic Liver Segmentation Method For Three- Dimensional Computed Tomography Dataset by Chew, Chin Boon

    Published 2018
    “…The segmentation results from the algorithm developed are competitive. However, improvements still can be made.…”
    Get full text
    Get full text
    Monograph