Search Results - (( pattern using sparse algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- sparse algorithm »
- java application »
- pattern using »
- using sparse »
-
1
Prime-based method for interactive mining of frequent patterns
Published 2010“…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
Get full text
Get full text
Thesis -
2
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Moreover, sparse coding has been commonly used in recent years for the purposes of retrieving and identifying images. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…In some cases, they are quite distant and sparseness. This uniqueness of Y-STR data has become problematic in partitioning the data using the existing partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
5
A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences
Published 2025“…Using ResNet, the algorithm can learn more complex and nuanced patterns in the data, leading to more accurate recommendations. …”
Get full text
Get full text
Get full text
Thesis -
6
Effect of masking techniques on computational complexity reduction of scale invariant feature transform
Published 2015“…The Scale Invariant Feature Transform (SIFT) is algorithm use in feature detection and description, it is famous and has dominated the research community. …”
Get full text
Get full text
Thesis -
7
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…In this research, the tracking is proposed by using the overlap ratio (OR) and centre location error (CLE). …”
Get full text
Get full text
Monograph -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
