Search Results - (( developing small extraction algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Developing and validating a simulation model for counting and classification of vehicles by Ali Emad Jehad, Riza Atiq O.K. Rahmat

    Published 2016
    “…An algorithm system approach has been presented for extracting traffic data using video image processing. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Prediction of ADHD from a small dataset using an adaptive EEG theta/beta ratio and PCA feature extraction by Sase, Takumi, Othman, Marini

    Published 2022
    “…In this paper, we propose an adaptive EEG feature extraction approach using TBR and PCA. Repeated TBR-PCA feature extraction, SVM classification and statistical testing were applied on a small EEG sample with ADHD/typically developing (TD) labels. …”
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Prediction of ADHD from a small dataset using an adaptive EEG Theta/Beta Ratio and PCA feature extraction by Sase, Takumi, Othman, Marini

    Published 2022
    “…In this paper, we propose an adaptive EEG feature extraction approach using TBR and PCA. Repeated TBR-PCA feature extraction, SVM classification and statistical testing were applied on a small EEG sample with ADHD/typically developing (TD) labels. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An Automated Feature Extraction Algorithm for Diagnosis of Gear Faults by Irfan, M., Saad, N., Alwadie, A., Awais, M., Aman Sheikh, M., Glowacz, A., Kumar, V.

    Published 2019
    “…This issue has been addressed in this paper through the development of the automated spectral extraction algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    New Instances Classification Framework On Quran Ontology Applied To Question Answering System by Utomo, Fandy Setyo, Suryana, Nanna, Azmi, Mohd Sanusi

    Published 2019
    “…This algorithm is chosen since it robustness to noisy data and has an excellent achievement to handle small dataset. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  10. 10

    PV fault classification: Impact on accuracy performance using feature extraction in random-forest cross validation algorithm by Muhamad Zahim, Sujod, Siti Nor Azlina, Mohd Ghazali, Mohd Fadzil, Abdul Kadir, Al-Shetwi, Ali Qasem

    Published 2024
    “…As the results, all SFDC models (small, medium, large-scale) developed have achieved 100% accuracy for all fault types in training simulations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Synthetic Analysis Of Fluid Flow Through Particle Image Velocimetry (PIV) by Ahmad Fauzi, Marwan Asyraaf

    Published 2016
    “…The research is about creating an algorithm derived from cross-correlation theory that is being used in extracting velocity of the fluid. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…Algorithms have been developed for extracting these features after segmenting the head and the two hands. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    Image storage and retrieval using color quantization method by Mandal, Koushik Kanti, Islam, Md. Rafiqul, Md. Sap, Mohd. Noor, Khatun, Fahmida, Reza, Md. Parvez

    Published 2005
    “…The image is segmented by our proposed segmentation algorithm, which uses the compact color descriptor .The result of the experiment shows that the developed segmentation algorithm produces better performances as compared with the existing segmentation algorithm. …”
    Get full text
    Get full text
    Article
  16. 16

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
    Get full text
    Get full text
    Thesis
  17. 17

    Fetal heart rate monitoring during pregnancy for assessing the well-being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…A filtering technique has been utilized in the proposed algorithm to extract the fetal signal from the maternal abdominal signal. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2017
    “…A filtering technique has been utilized in the proposed algorithm to extract the fetal signal from the maternal abdominal signal. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Fetal heart rate monitoring during pregnancy for assessing the well being of the fetus by Ibrahimy, Muhammad Ibn

    Published 2018
    “…A filtering technique has been utilized in the proposed algorithm to extract the fetal signal from the maternal abdominal signal. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat by Selamat, Nur Syuhada

    Published 2021
    “…As with most studies,careful attention was paid to false positive and false negative rates which reduce their overall detection accuracy and effectiveness.The result showed that the Random Forest algorithm is the best detection accuracy compares to others classifier with 99 % on a relatively small dataset. …”
    Get full text
    Get full text
    Thesis