Search Results - (( features extraction make algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Genetic algorithm based ensemble framework for sentiment analysis by Lai, Po Hung

    Published 2018
    “…Machine Learning classification is commonly used in sentiment analysis and it requires plain text documents to be transformed to analyzable data through feature extraction and selection. Feature extraction produces various representations of plain text documents whereas feature selection selects the features that are useful and relevant to the classification task. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Then, based on the characteristics of each species, decision making is done by means of ant colony optimisation as a search algorithm to return the optimal subset of features regarding the related species. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms by Anuar N.K., Bakar A.A., Ahmad A.R., Yussof S., Rahim F.A., Ramli R., Ismail R.

    Published 2023
    “…Data Analytics; Data mining; Decision making; Feature extraction; Machine learning; Predictive analytics; Privacy by design; Features selection; Fine grains; No leakages; Predictive modeling; Privacy preserving; Learning algorithms…”
    Conference Paper
  6. 6

    Fuzzy based technique for microchip lead inspection using machine vision by Hawari, Yasser, Salami, Momoh Jimoh Emiyoka, Aburas, Abdurazzag Ali

    Published 2008
    “…Using the features extracted, the algorithm first finds a proper thresholding value. …”
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    Diagnosis of diabetic retinopathy: Automatic extraction of optic disc and exudates from retinal images using Marker-controlled watershed transformation by Reza, A.W., Eswaran, C., Dimyati, K.

    Published 2010
    “…The proposed algorithm makes use of average filtering and contrast adjustment as preprocessing steps. …”
    Get full text
    Article
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS by Ahmed A.L., Hassoon N., Hak L.A.L., Edan M., Abed H., Abd S.

    Published 2023
    “…In this paper, a new hybrid strategy Particle Swarm Optimization (PSO) with Bat Algorithm (BA) is proposed to extract features from fingerprint images. …”
    Article
  10. 10
  11. 11

    Feature decision-making ant colony optimization system for an automated recognition of plant species by Ghasab, Mohammad Ali Jan, Khamis, Shamsul, Faruq, Mohammad, Fariman, Hessam Jahani

    Published 2015
    “…In the present paper, an expert system for automatic recognition of different plant species through their leaf images is investigated by employing the ant colony optimization (ACO) as a feature decision-making algorithm. The ACO algorithm is employed to investigate inside the feature search space in order to obtain the best discriminant features for the recognition of individual species. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Real‑time chatter detection during turning operation using wavelet scattering network by Sharma, Sanjay, Gupta, Vijay Kumar, Rahman, Mustafizur, Saleh, Tanveer

    Published 2024
    “…Experiments are performed to collect the acoustic signal during the turning operation to train and validate the algorithm. The automatic extracted chatter features are then used in supervised machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Keypoint Descriptors in SIFT and SURF for Face Feature Extractions by Suk, Ting Pui, Minoi, Jacey Lynn

    Published 2018
    “…We will the results of the experiments on face image data. The extracted keypoints and the regions of interest are analysed and compared against the corresponding facial features. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Square groove detection based on forstner with canny edge operator using laser vision sensor by Mohammed Naji, Osamah Abdullah Ahmed

    Published 2023
    “…This research addresses 1he feature extraction algorithm of 1he square weld groove to make weld seam recognition more accurate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Social networks content analysis for peacebuilding application by Shaikh, Muniba, Salleh, Norsaremah, Abdullah, Lili Marziana

    Published 2015
    “…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Hybrid Algorithm for Hand Gesture Recognition by Gupta, Shikha, Jaafar, J., Wan Ahmad, Wan Fatimah

    Published 2012
    “…Hence in this paper, a hybrid algorithm is being introduced to reduce the complexity of process also to make it insensitive with respect to the position of camera by making use of Gabor filer to get the structure of the hand followed by the Mel scaling in order to reduce the dimensions along with feature extraction using triangular filters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…The feature extraction module was tested for its speed using various ROI sizes. …”
    Get full text
    Get full text
    Thesis