Search Results - (( java application a algorithm ) OR ( based extraction method algorithm ))
Search alternatives:
- extraction method »
- java application »
- based extraction »
- method algorithm »
- application a »
- a algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We propose a new method of analysing Android Intent in Java code, which includes implicit intent and explicit intent. …”
Get full text
Get full text
Get full text
Thesis -
4
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
6
-
7
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
A block-based multi-scale background extraction algorithm
Published 2010“…Approach: In this study, to extract an adaptive background, a combination of blocking and multi-scale methods is presented. …”
Get full text
Get full text
Article -
10
Genetic algorithm based ensemble framework for sentiment analysis
Published 2018“…Prior to developing the whole multilayered ensemble framework, two separate experiments were performed to evaluate and study the different methods of feature extraction and selection. Methods of feature extraction can be separated into word based and phrase based. …”
Get full text
Get full text
Thesis -
11
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Article -
12
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023Conference Paper -
13
Topic identification using filtering and rule generation algorithm for textual document
Published 2015“…The rule generation algorithm (TopId) is proposed to identify topic for each verse based on the extracted terms. …”
Get full text
Get full text
Get full text
Thesis -
14
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Electroencephalogram-based decoding cognitive states using convolutional neural network and likelihood ratio based score fusion
Published 2017“…The wavelet transform-support vector machine method is the most popular currently used feature extraction and prediction method. …”
Get full text
Get full text
Article -
16
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
18
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Feature extraction techniques based on global feature extraction such as Principle Component Analysis (PCA) were implemented. …”
Get full text
Get full text
Thesis -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis
