Search Results - (( java implementation svm algorithm ) OR ( using ((coding using) OR (engine using)) algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Study of optimal EG placement in radial distribution system using real coded genetic algorithm by M. H., Sulaiman, Omar, Aliman

    Published 2011
    “…RCGA is a method that uses continuous floating numbers as representation which is different from conventional GA which is using binary numbers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…The algorithm experiments are carried out using the chain code representation created from previous research of the Centre of Excellence for Document Analysis and Recognition (CEDAR) dataset, which consists of 126 upper-case letter characters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode by Abas, Azizi, Yusof, Yuhanis, Ahmad, Farzana Kabir

    Published 2017
    “…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimality of bus-invert coding by Rokhani, Fakhrul Zaman, Kan, Wen Chih, Kieffer, John, Sobelman, Gerald E.

    Published 2009
    “…We also show that partitioning an M-bit bus into P subbuses and using bus-invert coding on each subbus can be described as applying the Viterbi algorithm on a 2P-state trellis.…”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES by MOHD. NURI, NUR DIANA

    Published 2008
    “…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Performance Analysis In IoT Based Home Automation Using Hybrid RS-LDPC Codes by Ng, Lay Wei

    Published 2018
    “…The thesis proposes an error detection and correction algorithms using Hybrid RS-LDPC codes for the channel encoding and decoding in the home automation system. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Another perspective in generating and using gray code word by Ahmad, Anita

    Published 2007
    “…The design of generating the code using VHDL, hardware and algorithmic implementation procedures are embodied in this paper. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Increasing data storage of coloured QR code using CoMMT technique by Abas, Azizi, Yusof, Yuhanis, Din, Roshidi, Azzali, Fazli, Osman, Baharudin

    Published 2020
    “…Quick Response (QR) Code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Instead of random Gaussian signal, we trained the codebook using LBG algorithm for Surah Al-Fatihah, and used the trained codebook for the whole Quran. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper