Search Results - (( java implementation models algorithm ) OR ( using classification matching algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm by Nurcahyawati, Vivine, Mustaffa, Zuriani

    Published 2023
    “…Many of these dimensionalities have a major impact on the complexity and performance of the algorithms used for classification. Various challenges were encountered, including how to determine the optimal combination of pre-processing techniques, how to clean the dataset, and determine the best classification algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm by Addie Irawan, Hashim, Marni Azira, Markom, Abdul Hamid, Adom, Mohd Muslim Tan, E. S.

    Published 2017
    “…The localisation algorithm is developed using scan matching method which is incorporated with K-nearest neighbours (KNN) classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Converged Classification Network For Matching Cost Computation by Hamid, Mohd Saad, Abd Manap, Nurulfajar, Hamzah, Rostam Affendi, Kadmin, Ahmad Fauzan

    Published 2020
    “…Overall quantitative results for the proposed work performed competitively compared to other established stereo matching algorithm based on the Middlebury standard benchmark online system.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  7. 7
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Partial fingerprint recognition using support vector machine by Vijayaprasad, Perumal, Sulaiman, Md. Nasir, Mustapha, Norwati, O. K. Rahmat, Rahmita Wirza

    Published 2010
    “…Global minutiae-based matching algorithm is used to record the matching pairs and their feature vectors are used to generate a model file which is used for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition by M. A., Ameedeen, Marhaini, M. S.

    Published 2016
    “…While the algorithm helped to classify different types of wavelengths produced from the sensor, a classification-based algorithm via Pattern Recognition Method will be used to classify and match the food components. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Moreover with simple concatenating features, classification results are not optimal. It is crucial to integrate these heterogeneous features to create more accurate and robust classification results than using each individual type of features. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…It is designed to incorporate with the CAPSOCA algorithm which intended to strengthen the classification outcomes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…Classification rules were generated from training feature vectors set, and a modified form of the standard voter classification algorithm, that use the rough sets generated rules, was applied. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20