Search Results - (( java application customization algorithm ) OR ( based perception modelling algorithm ))
Search alternatives:
- customization algorithm »
- perception modelling »
- modelling algorithm »
- java application »
- based perception »
-
1
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
2
Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim
Published 2024“…The research contributes a comprehensive exploration of sentiment analysis, combining technical expertise with societal insights. The SVM-based sentiment analyzer offers a user-friendly tool bridging complex algorithms and practical applications. …”
Get full text
Get full text
Thesis -
3
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
4
Risk perception modeling based on physiological and emotional responses / Ding Huizhe
Published 2024“…However, when risk degrees were closely matched, the integrated model with weight adjustments based on base models outperformed ANN. …”
Get full text
Get full text
Get full text
Thesis -
5
Particle-based perception of garment folding for robotic manipulation purposes
Published 2023Article -
6
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
Get full text
Thesis -
7
The Development of Color Based Visual Search Utility
Published 2001“…An introduction to color perception, the theoretical foundations of the human image retrieving process, and the content-based image systems and their uses was presented. …”
Get full text
Get full text
Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Enhancement of Groundwater-Level Prediction Using an Integrated Machine Learning Model Optimized by Whale Algorithm
Published 2023“…The present study attempted to predict groundwater levels (GWL) obtained from precipitation and temperature data based on various temporal delays. The radial basis function (RBF) neural network�whale algorithm (WA) model, the multilayer perception (MLP�WA) model, and genetic programming (GP) were used to predict GWL. …”
Article -
10
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…The comparison of results is based on the different user's perceptions, their involvement in the VIGA-20 and the difference of the fitness convergence as compared to Simple Genetic Algorithm.…”
Get full text
Get full text
Thesis -
11
-
12
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
thesis::master thesis -
13
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A rule-based image segmentation method and neural network model for classifying fruit in natural environment / Hamirul'aini Hambali
Published 2015“…For object classification, some methods have the ability to identify objects as good as human experts who normally classify objects based on visual perception. However, classifying objects in natural environment is difficult due to the presence of direct illumination on the object surface.Therefore, this research has developed a semi-supervised Fuzzy c-means (FCM) and neural network (NN) model that are able to classify objects based on their surface colour. …”
Get full text
Get full text
Thesis -
16
Predictive Analytics for Crude Oil Price Using RNN-LSTM Neural Network
Published 2020“…This study aims to certify the capability of a prediction model built based on the RNN-LSTM network to predict the future price of crude oil. …”
Get full text
Get full text
Conference or Workshop Item -
17
Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli
Published 2018“…Using Harmonic Noise Model (HNM) as the synthesizer, the grammar-based prosody modification rules are used to produce the synthesized storytelling speech. …”
Get full text
Get full text
Thesis -
18
A student learning style auto-detection model in a learning management system
Published 2023“…The online learning activities identified were then mapped to the Felder-Silverman model based on four model dimensions: processing, perception, input, and understanding. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Value-based Maintenance Management Model for University Buildings in Malaysia - A Critical Review
Published 2009“…The outcome of this research is to come up with a prototype maintenance management model that can facilitate university institutions to carry out buildings maintenance management services that meet the expectations and perceptions of the stakeholders.…”
Get full text
Get full text
Get full text
Citation Index Journal
