Search Results - (( java segmentation using algorithm ) OR ( filing process learning algorithm ))

Refine Results
  1. 1

    Classification of JPEG files by using extreme learning machine by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
    Get full text
    Get full text
    Article
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems by Mwinyi, Amir Kombo

    Published 2017
    “…The problem of rsync algorithm synchronization process is that rsync tries to check folders and files one by one, which takes long time to synchronize them. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
    Get full text
    Article
  5. 5

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  6. 6
  7. 7

    A review on security and privacy issues in E-learning and the MapReduce aproach by Noor Akma, Abu Bakar, Mazlina, Abdul Majid, Khalid, Adam, Kirahman, Ab Razak, Noorhuzaimi@Karimah, Mohd Noor

    Published 2019
    “…MapReduce is a promising parallel programming model for processing large data. Then, we proposed e-Learning using MapReduce algorithm in protecting the security and privacy of eLearning. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    PREDICTING THE PRICE OF COTTON USING RNN AND LSTM by MOHAMAD, AHMAD LUKMAN

    Published 2020
    “…The accuracy of each machine learning algorithm will be recorded and analyze to come up with the best model for the dataset. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Review on ubiquitous education system with multi-agent synchronization on mobile learning application environment by Mwinyi, Amir Kombo, Syed Mohamed, Syed Abdul Rahman Al Haddad, Abdullah, Rusli, Hashim, Shaiful Jahari

    Published 2012
    “…Sync agent which is Multi-agent system is a promising technique which, we believe that, this approach has a potential of increasing the performance of the network and easy learning process by speed up the update process of the mobile learning contents.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Object detection system using haar-classifier by Wan Najwa, Wan Ismail

    Published 2009
    “…The invention of new algorithms had encouraged to the reinforcement of image processing’s application. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…Today, JPEG image files are popular file formats that have less structured contents which make its carving possible in the absence of any file system metadata. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…Integrating SSA and SVM machine learning algorithms improves decision-making processes, leading to better crop yield through early detection and timely nutrient management. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Malware Classification and Detection using Variations of Machine Learning Algorithm Models by Andi Maslan, Andi Maslan, Abdul Hamid, Abdul Hamid

    Published 2025
    “…The research stage starts from pre-Processing, extraction, feature selection and classification processes and performance testing. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Python 3.13 is used for dataset processing and EPDL model building. Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
    thesis::doctoral thesis
  20. 20