Search Results - (( generation classification matching algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- generation classification »
- classification matching »
- implementation level »
- java implementation »
- level algorithm »
-
1
Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm
Published 2023“…Many of these dimensionalities have a major impact on the complexity and performance of the algorithms used for classification. Various challenges were encountered, including how to determine the optimal combination of pre-processing techniques, how to clean the dataset, and determine the best classification algorithm. …”
Get full text
Get full text
Get full text
Article -
2
Converged Classification Network For Matching Cost Computation
Published 2020“…Overall quantitative results for the proposed work performed competitively compared to other established stereo matching algorithm based on the Middlebury standard benchmark online system.…”
Get full text
Get full text
Get full text
Article -
3
Automatic email classification system / Phang Siew Ting
Published 2003“…For this purpose, several Machine Learning algorithms has been purposed to automate the classification of emails. …”
Get full text
Get full text
Thesis -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
5
Partial fingerprint recognition using support vector machine
Published 2010“…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
Get full text
Get full text
Get full text
Article -
6
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…In this thesis rough sets approach was used in the preprocessing stages, namely in the vector quantization operation in which feature vectors are quantized or classified to a finite set of codebook classes. Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
Get full text
Get full text
Thesis -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…At classification level, Gaussian multi-class Support Vector Machine (SVM) with the One-Against-All (OAA) approach is proposed to evaluate verification performance rates of the feature extraction algorithms. …”
Get full text
Get full text
Thesis -
9
AUTONOMOUS MOBILE ROBOT VISION BASED SYSTEM: HUMAN DETECTION BY COLOR
Published 2013“…Then classification algorithm is applied to find the centroid of the human. …”
Get full text
Get full text
Article -
10
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
11
A comparative study in classification techniques for unsupervised record linkage model
Published 2011“…Problem statement: Record linkage is a technique which is used to detect and match duplicate records which are generated in data integration process. …”
Get full text
Get full text
Get full text
Article -
12
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
13
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
14
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Travel place recommendation system using K-Nearest Neighbors algorithm / Nur Amirah Shahidan
Published 2021“…The method has been proposed in the recommendation system is K-Nearest Neighbors algorithm. K-Nearest Neighbors algorithm is widely used among classification algorithm in recommendation system. …”
Get full text
Get full text
Thesis -
19
Finger Vein Recognition Using Pattern Map As Feature Extraction
Published 2012“…Finally, nearest neighbour classifier with Euclidean distance metrics is used for classification. The main contribution of this thesis is the new way of generating pattern templates, which selects small blocks from every class within an area of constraint. …”
Get full text
Get full text
Thesis -
20
Radar - Acoustic Vehicle Classification System based on shallow Convolutional Neural Network
Published 2025“…Overall, this study delivers a reliable, precise, and efficient framework for next-generation ITS, enabling cost-effective, realtime vehicle classification for smarter urban traffic management.…”
Get full text
Get full text
Thesis
