Search Results - (( java implementation _ algorithm ) OR ( automatic classification matching algorithm ))

Refine Results
  1. 1

    Automatic email classification system / Phang Siew Ting by Phang , Siew Ting

    Published 2003
    “…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Trademark image classification approaches using neural network and rough set theory by Saad, Puteh

    Published 2003
    “…The critical step in automatic trademark matching is to extract trademark features from the database automatically and reliably. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Feature-based face recognition system using utilized artificial neural network by Chai, Tong Yuen

    Published 2010
    “…The main contributions of this project are the automatic algorithms for mouth detection, facial features cropping and face classification. …”
    Get full text
    Thesis
  5. 5

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…In order to utilize the supervised classification algorithms without consuming a lot of time for labeling data manually, a two step method which selects the training data automatically has been proposed in previous studies. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7
  8. 8

    Stage of maturity banana fruit classification using image processing / Nadia Kasim ... [et al.] by Kasim, Nadia, Zainol Abidin, Siti Nazifah, Abu Mangshor, Nur Nabilah, Mohamed Hamzah, Hazwa Hanim, Abd Rahim, Nurul Zahirah

    Published 2019
    “…The system showed 88.89% accuracy classification by comparing the result yield by the system with results offered by the experts. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimized image enhancement of colour processing for retinal fundus image by Nurul Atikah, Mohd Sharif

    Published 2025
    “…This study introduces two novel techniques designed to overcome the limitations of existing algorithms. Firstly, a new colour correction algorithm named Fuzzy Tuned Brightness Controlled Single-Scale Retinex Histogram Matching (fTBCSSRhm) is proposed to address the issue of colour inconsistency in the dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Optimized image enhancement of colour processing for retinal fundus image by Nurul Atikah, Mohd Sharif

    Published 2025
    “…This study introduces two novel techniques designed to overcome the limitations of existing algorithms. Firstly, a new colour correction algorithm named Fuzzy Tuned Brightness Controlled Single-Scale Retinex Histogram Matching (fTBCSSRhm) is proposed to address the issue of colour inconsistency in the dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application by Zun Liang, Chuan, David, Chong Teak Wei, Connie, Lee Wai Yan, Muhammad Fuad Ahmad, Nasser, Nor Azura Md, Ghani, Abdul Aziz, Jemain, Choong-Yeun, Liong

    Published 2023
    “…Moreover, the proposed identification algorithm is also tested in different scenarios, including based on the classification of strength association measurements between the extracted feature sets. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Fingerprint feature extraction based discrete cosine transformation (DCT) by Chin Kim On, Paulraj M. Pandiyan, Sazali Yaacob, Azali Saudi

    Published 2009
    “…It is impossible that two people have the same fingerprint. Automatics identification of humans based on fingerprint requires the input fingerprint to be match with a large number of fingerprints in the database. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  18. 18

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Biometric is a pattern recognition system which is used for automatic recognition of persons based on characteristics and features of an individual. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Document clustering based on inverse document frequency measure by Wan Faridah Hanum, Wan Yaacob

    Published 2005
    “…Automatic classification techniques are capable of providing the necessary information organization by arranging the retrieved data into groups of documents with common subjects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…An automatic thresholding algorithm was used to separate the area composed of the breast and the pectoral muscle from the background of the image. …”
    Get full text
    Get full text
    Thesis