Search Results - (( developing special extraction algorithm ) OR ( java code classification algorithm ))
Search alternatives:
- extraction algorithm »
- code classification »
- developing special »
- special extraction »
- java »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
2
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
3
Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff
Published 2006“…The analysis is derived by excavating literature on RE techniques starting from the year 1993 until 2003 focused on supervised learning algorithm. The framework primarily demonstrates that each approach does not require a special training process for a new input dataset and does not require special network architecture and it can be used as a guideline to ANNs researcher and developer to choose a suitable RE techniques in order for them to perform ANNs' research or developing ANN applications.…”
Get full text
Get full text
Research Reports -
4
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
5
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…This paper presents an algorithm for extracting underlying frequency components of massive Electroencephalogram (EEG) data. …”
Get full text
Get full text
Get full text
Article -
6
Photovoltaic shunt active power filter based on indirect self-charging with step size error cancellation and simplified adaptive linear neuron
Published 2017“…In methodology, topology of PV SAPF was designed first, and followed by all control algorithms with special attention to both proposed algorithms. …”
Get full text
Get full text
Thesis -
7
Image storage and retrieval using color quantization method
Published 2005“…The image is segmented by our proposed segmentation algorithm, which uses the compact color descriptor .The result of the experiment shows that the developed segmentation algorithm produces better performances as compared with the existing segmentation algorithm. …”
Get full text
Get full text
Article -
8
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
9
Rule-based filtering algorithm for textual document
Published 2017“…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
Get full text
Get full text
Get full text
Article -
10
A new classification model for online predicting users' future movements
Published 2008“…For this reason some techniques have been developed for predicting user’s future requests. Data manning algorithms can be applied to many prediction problems. …”
Get full text
Get full text
Conference or Workshop Item -
11
The Development of Color Based Visual Search Utility
Published 2001“…Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
Get full text
Get full text
Thesis -
12
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…The routing problems in VLSI physical design are, in essence, shortest path problems in special graphs. It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
Get full text
Get full text
Get full text
Thesis -
13
“Analysis of EEG Recordings During Grasp and Lift (GAL) Trials
Published 2018“…EEG stands for Electroencephalography is a medical technique that is used to extract the signal in the brain by using a special medical device known as electroencephalogram. …”
Get full text
Get full text
Final Year Project -
14
Crowdsource requirements engineering: Using online reviews as input to software features clustering
Published 2024journal::journal article -
15
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
16
-
17
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
18
Image authentication using Zernike moment watermarking
Published 2013“…The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. …”
Get full text
Get full text
Thesis -
19
3D face registration across pose variation and facial expression using cross profile alignment
Published 2011“…Thus, as the first step prior face registration, the thesis proposed a novel nose tip region detection algorithm using localized point signature, developed specially to locate the nose tip region across various facial variation. …”
Get full text
Get full text
Thesis -
20
A three dimensional (3D) vision based defect inspection system for gluing application
Published 2013“…Three types of defect are trained as model templates and save to the memory known as bumper, gap and bubble defect. Each defect has special characteristic. Inspection system developed to identify problems occurs in gluing process. …”
Get full text
Get full text
Get full text
Get full text
Thesis
