Search Results - (( java application customization algorithm ) OR ( concern extraction method algorithm ))
Search alternatives:
- customization algorithm »
- concern extraction »
- extraction method »
- java application »
- method algorithm »
-
1
Optimizing timber transportation planning for timber harvesting using bees algorithm in Malaysia
Published 2023“…Suitable extraction technique and the least cost while reducing the environmental impact is the primary concern in timber transportation planning in undulate topography. …”
Get full text
Get full text
Article -
2
Motor imagery task classification using transformation based features
Published 2017“…The extracted features areclassified and benchmarked against extracted features of LP SVD method. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
3
Text based personality prediction from multiple social media data sources using pre-trained language model and model averaging
Published 2021“…Unlike earlier work which adopts a single social media data with open and close vocabulary extraction method, the proposed work uses multiple social media data sources namely Facebook and Twitter and produce a predictive model for each trait using bidirectional context feature combine with extraction method. …”
Get full text
Get full text
Get full text
Article -
4
Power line corridor vegetation encroachment detection from satellite images using retinanet and support vector machine
Published 2023“…Also, a corridor extraction algorithm has been developed to extract the region of interest (ROI) around the transmission towers. …”
text::Thesis -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses principal component analysis (PCA) as a feature extraction method to extract 117 independent and discriminative features with 95% of variance. …”
Get full text
Get full text
Get full text
Thesis -
7
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
Get full text
Get full text
Get full text
Article -
8
Fusion of moment invariant method and deep learning algorithm for COVID-19 classification
Published 2021“…This paper proposes a fusion of a moment invariant (MI) method and a DL algorithm for feature extraction to address the instabilities in the existing COVID-19 classification models. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm
Published 2020“…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
Get full text
Get full text
Thesis -
10
Property premises intruders detection using face recognition method / Joveni Henry
Published 2017“…Therefore, this project emphasize strongly on developing a system that can detect intruders of property premises by using the face recognition method. This project will focus mainly on the Viola-Jones algorithm for face and facial parts detection, facial geometry distance measure for feature extraction and Similarity Measure algorithm using the Euclidian Distance to perform face recognition. …”
Get full text
Get full text
Thesis -
11
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Modeling of road geometry and traffic accidents by hierarchical object-based and deep learning methods using laser scanning data
Published 2018“…There was a need for efficient segmentation algorithm, optimization strategy, feature extraction and classification, and robust statistical and computational intelligence models to accomplish the set aims. …”
Get full text
Get full text
Get full text
Thesis -
13
Social networks content analysis for peacebuilding application
Published 2015“…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Trajectory planning and simulation for 3d printing process
Published 2022“…The slicing method used is basic slicing. The slicing algorithm consists of two sections: intersection point tracking algorithm and contour creation algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Finally, mathematical experimentation is proceeded concerning on verification and validation of the new algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Consumer acceptance and perceptions of electric vehicles in Malaysia using sentiment analysis
Published 2025“…The dataset is scrapped data collected from comments on YouTube with Term Frequency-Inverse Document Frequency (TF-IDF) as the feature extraction method. The machine learning algorithm, support vector machine (SVM), is then created to automatically identify and classify comments about EV acceptance and perception. …”
Get full text
Get full text
Get full text
Article -
17
An integrated deep learning deepfakes detection method (IDL-DDM)
Published 2024“…Consequently, such manipulation via intelligent algorithm contributes to more crucial circumstances as electronic media integrity become a challenging concern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
PREDICTIVE MAXIMUM POWER POINT TRACKING (MPPT) ALGORITHM FOR PERMANENT EXCHANGE MEMBRANE FUEL CELL (PEMFC)
Published 2022“…A comparison of PEMFC performances based on the proposed technique with other existing MPPT algorithms will be done to validate the algorithm performance. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Adaptive Initial Contour and Partly-Normalization Algorithm for Iris Segmentation of Blurry Iris Images
Published 2022“…Next, the adaptive initial contour (AIC), δ, and stopping function were integrated to create the adaptive Chan-Vese active contour (ACVAC) algorithm. Finally, the partly -normalization method for normalization and feature extraction was designed by selecting the most prominent iris features. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Characterization of PV panel and global optimization of its model parameters using genetic algorithm
Published 2023“…This paper details an improved modeling technique for a photovoltaic (PV) module; utilizing the optimization ability of a genetic algorithm, with different parameters of the PV module being computed via this approach. …”
Article
