Search Results - (( development authority classification algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…The second one is to develop prototype for classification of credit cardholder behavior based on k Nearest Neighbors Algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…This research algorithm demonstrated a very promising result with Support Vector Machines, this algorithm produces a 90% of accuracies whereas the decision tree algorithm gets 100% accuracies. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5
  6. 6

    Identification and Grading of Manage Using Image Processing by Shukor, Syazwan

    Published 2021
    “…The criteria of mangos to be assessed by the grading algorithm are color and weight. Classification of these mangos are conducted based on standards set by Federal Agriculture Marketing Authority (FAMA) mango ripeness index, Project activities have started using a proposed activity flow for algorithm development using Python and the experimental chamber setup for actual mange data collection. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…The impetus for developing a new and efficient GA-FIS model arises from the need of constructing fuzzy rules directly from raw data sets that combines good approximation and classification properties with compactness and transparency. …”
    Article
  8. 8

    Classification of imbalanced travel mode choice to work data using adjustable svm model by Qian, Y., Aghaabbasi, M., Ali, M., Alqurashi, M., Salah, B., Zainol, R., Moeinaddini, M., Hussein, E.E.

    Published 2021
    “…This study deals with imbalanced mode choice data by developing an algorithm (SVMAK) based on a support vector machine model and the theory of adjusting kernel scaling. …”
    Get full text
    Get full text
    Article
  9. 9

    Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine by Molla Salilew, W., Ambri Abdul Karim, Z., Alemu Lemma, T.

    Published 2022
    “…Classification is an essential task for many applications, including text classification, image classification, data classification, and so on. …”
    Get full text
    Get full text
    Article
  10. 10

    Investigation of fault detection and isolation accuracy of different Machine learning techniques with different data processing methods for gas turbine by Molla Salilew, W., Ambri Abdul Karim, Z., Alemu Lemma, T.

    Published 2022
    “…Classification is an essential task for many applications, including text classification, image classification, data classification, and so on. …”
    Get full text
    Get full text
    Article
  11. 11

    Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin by Samsuddin, Nur Haida Hanna

    Published 2020
    “…Therefore, the chosen technique is classification and the algorithm that will be applied in the classification process is Linear Support Vector Machines (LSVM). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Optimizing in-car-abandoned children’s sounds detection using deep learning algorithms / Nur Atiqah Izzati Md Fisol by Md Fisol, Nur Atiqah Izzati

    Published 2023
    “…To address this problem, an optimized in-car-abandoned children's sounds detection model using deep learning algorithms is proposed. The objective of this study is to develop an accurate and efficient model capable of recognizing the presence of children in cars based on sound data. …”
    Get full text
    Get full text
    Student Project
  14. 14

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Simultaneous fault diagnosis based on multiple kernel support vector machine in nonlinear dynamic distillation column by Taqvi, S.A.A., Zabiri, H., Uddin, F., Naqvi, M., Tufa, L.D., Kazmi, M., Rubab, S., Naqvi, S.R., Maulud, A.S.

    Published 2022
    “…In the developed MK-SVM algorithm, multilabel approach based on various kernel functions has been utilized for the classification of simultaneous faults. …”
    Get full text
    Get full text
    Article
  16. 16

    A Steganalysis Classification Algorithm Based on Distinctive Texture Features by Hammad B.T., Ahmed I.T., Jamil N.

    Published 2023
    “…As a result, distinguishing between the two symmetric images required the development of methods. Steganalysis is a technique for identifying hidden messages embedded in digital material without having to know the embedding algorithm or the �non-stego� image. …”
    Article
  17. 17

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article