Search Results - (( java implementation learning algorithm ) OR ( pattern visualization clustering algorithm ))
Search alternatives:
- visualization clustering »
- implementation learning »
- pattern visualization »
- java implementation »
- learning algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…Moreover, skin lesion images are clustered based on fused color, pattern and shape based features. …”
Get full text
Get full text
Get full text
Article -
7
Exploratory study of Kohonen network for human health state classification
Published 2018Get full text
Get full text
Article -
8
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
11
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…(c) To study how constructed patterns and trends generate informed decisions on resource allocation for circulation function by using cluster analysis, frequency statistics, averages and aggregates and market basket analysis algorithm. …”
Get full text
Get full text
Thesis -
12
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
Get full text
Get full text
Get full text
Thesis -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
14
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…Each drop when falling in high speed will create a streak motion blurred illusion based on the background intensity that reflects the environment creating higher intensity pattern in an image. In this thesis rain streak have been captured and isolated from the background scene by using an embossed filter algorithm designed to highlight the transparent rain streaks that cause the blur and distortion of the video, while the removing algorithm is based on a simple algorithm that correlates spatio-temporal and depth of an image into one technique. …”
Get full text
Get full text
Thesis -
15
Dynamic Mapping and Visualizing Dengue Incidences in Malaysia Using Machine Learning Techniques
Published 2021“…K-mean, KNN, and Expectation-Maximization (EM) algorithms are used to cluster the cases and visualize the pattern of dengue spread. …”
Get full text
Get full text
Article -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
17
Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids
Published 2015“…Among these 13 E. lanceolatus and E. fuscoguttatus ncni-ANM loci ranged in size from 153 to 177 bp and 157 to 624 bp respectively revealing variation across all OTUs through visualization of agarose gel electrophoresis patterns and binary matrix scoring. …”
Get full text
Get full text
Get full text
Thesis -
18
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…They work by first mapping the raw input data onto a (often much) higher dimensional feature space, and then clustering in the feature space instead. The reasoning is that mapping onto the (higher-dimensional) feature space enables the comparison of additional, higher order correlations in determining patterns between the raw data points. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
