Search Results - (( development action classification algorithm ) OR ( java data function algorithm ))
Search alternatives:
- action classification »
- development action »
- function algorithm »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
Get full text
Get full text
Thesis -
3
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
Get full text
Get full text
Thesis -
4
A fuzzy approach for early human action detection / Ekta Vats
Published 2016“…In order to perform early human action detection, the conventional classification problem is modified into frame-by-frame level classification. …”
Get full text
Get full text
Thesis -
5
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Sentiment analysis of restaurant reviews in Kuala Terengganu based on K-Nearest Neighbor/ Siti Syazwana Jafri
Published 2021“…The chosen technique is classification and the algorithm that will be applied in the classification process is K- Nearest Neighbor (KNN). …”
Get full text
Get full text
Thesis -
7
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…In order to overcome this problem, a classification model for intent recognition is developed. …”
Get full text
Get full text
Get full text
Article -
8
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…This study also has shown that Ant Colony Optimization was a suitable technique in developing the classification model.…”
Get full text
Get full text
Student Project -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles
Published 2022“…Among different algorithms, this study focuses on modelling the non- recursive phasor estimation method in a power Simulink environment for a standard test system equipped with a developed algorithm to detect the fault zone. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Personalized Recommendation Classification Model of Students’ Social Well-being Based on Personality Trait Determinants Using Machine Learning Algorithms
Published 2023“…This article will discuss the development of an adaptive personalized recommendation classification model for students’ social well-being based on personality trait determinants. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
EMG signal classification for human computer interaction: a review
Published 2009“…The EMG controller can be programmed to perform gesture recognition based on signal analysis of groups of muscles action potential. This review paper is to discuss the various methodologies and algorithms used for EMG signal classification for the purpose of interpreting the EMG signal into computer command.…”
Get full text
Get full text
Get full text
Article -
14
Decision tree and rule-based classification for predicting online purchase behavior in Malaysia / Maslina Abdul Aziz, Nurul Ain Mustakim and Shuzlina Abdul Rahman
Published 2024“…The result indicated that the highest accuracy of 89.34% was achieved by the Random Tree algorithm, while the rule-based algorithm PART reached an accuracy of 87.56%. …”
Get full text
Get full text
Article -
15
IoT-Enabled Waste Tracking and Recycling Optimization : Enhancing Sustainable Waste Management
Published 2025“…Advanced data preprocessing, such as augmentation and normalization, ensures robust model training, while optimized algorithms guide waste sorting based on classification results. …”
Get full text
Get full text
Get full text
Proceeding -
16
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
17
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
18
Wearable Sensor Feature Fusion for Human Activity Recognition (HAR) : A Proposed Classification Framework
Published 2022“…Human Activity Recognition (HAR) focuses on detecting people's daily regular activities based on time-series recordings of their actions or motions. Due to the extensive feature engineering and human feature extraction required by traditional machine learning algorithms, they are time consuming to develop. …”
Get full text
Get full text
Get full text
Proceeding -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…This information can be processed, analyzed, and transformed into inputs for a decisional algorithm that controls the sprayer nozzle action in real-time. …”
Get full text
Get full text
Thesis
