Search Results - (( java application system algorithm ) OR ( sets extraction method algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…This study provides a text extraction algorithm for web text classification. The extraction algorithm consists of three phases namely web page extraction, rule formulation, and algorithm validation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Genetic algorithm based ensemble framework for sentiment analysis by Lai, Po Hung

    Published 2018
    “…Prior to developing the whole multilayered ensemble framework, two separate experiments were performed to evaluate and study the different methods of feature extraction and selection. Methods of feature extraction can be separated into word based and phrase based. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A liver level set (LLS) algorithm for extracting liver's volume containing disconnected regions automatically by Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Mahmod, Ramlan, Abdul Rashid, Abdul Hamid

    Published 2008
    “…The liver level set (LLS) is separated into two stages which a pre-processing stage and a level set with a hybrid energy minimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…The proposed filtering algorithm (PFA) will extract the most relevant terms from text and solve synonym roblem amongst the extracted terms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A brief review on vessel extraction and tracking methods by Boroujeni, Farsad Zamani, Jahangard, Simindokht, O. K. Rahmat, Rahmita Wirza

    Published 2019
    “…This step is usually performed by enhancing vessel-like objects in the image, in order to differentiate between blood vessels and background, followed by applying the thinning algorithm to obtain the final output. Another approach is direct extraction of centerline points using exploratory tracing algorithm preceded by a seed point detection schema to provide a set of reliable starting points for the tracing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis