Search Results - (( severity classification matching algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Automatic email classification system / Phang Siew Ting by Phang , Siew Ting

    Published 2003
    “…Automatic Email Classification System is an email reader tool that implements machine learning algorithm in email classification, manipulated by a Graphical User Interface. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An experimental evaluation of case slicing as a new classification technique by Shiba, Omar A. A., Sulaiman, Md. Nasir, Ahmad, Fatimah, Mamat, Ali

    Published 2003
    “…Several classification techniques are designed to discover such classifications when the classifications are unknown. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim by Ibrahim, Shafaf

    Published 2015
    “…It is designed to incorporate with the CAPSOCA algorithm which intended to strengthen the classification outcomes. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Iban Plaited Mat Motif Classification using Adaptive Smoothing by Silvia, Joseph

    Published 2024
    “…First, the accuracy of the Scale Invariant Feature Transform (SIFT) combined with the Random Sample Consensus (RANSAC) algorithm was assessed on the dataset. The optimal peak threshold value for SIFT is reported to be 2.0e-2, and it achieved 100.0% matching accuracy for scale and rotation set. …”
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    Improved GART neural network model for pattern classification and rule extraction with application to power systems by Yap K.S., Lim C.P., Au M.T.

    Published 2023
    “…IGART enhances the dynamics of GART in several aspects, which include the use of the Laplacian likelihood function, a new vigilance function, a new match-tracking mechanism, an ordering algorithm for determining the sequence of training data, and a rule extraction capability to elicit if-then rules from the network. …”
    Article
  9. 9

    Travel place recommendation system using K-Nearest Neighbors algorithm / Nur Amirah Shahidan by Shahidan, Nur Amirah

    Published 2021
    “…K-Nearest Neighbors algorithm is widely used among classification algorithm in recommendation system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A Comparative of Two-Dimensional Statistical Moment Invariants Features in Formulating an Automated Probabilistic Machine Learning Identification Algorithm for Forensic Application by Zun Liang, Chuan, David, Chong Teak Wei, Connie, Lee Wai Yan, Muhammad Fuad Ahmad, Nasser, Nor Azura Md, Ghani, Abdul Aziz, Jemain, Choong-Yeun, Liong

    Published 2023
    “…To pursue this principal objective, several 2D statistical moment invariants have been compared and tested to determine the most suitable feature set applied in the proposed identification algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Document clustering based on inverse document frequency measure by Wan Faridah Hanum, Wan Yaacob

    Published 2005
    “…This paper describes several narrative clustering techniques such as Porter algorithm, Gusfield algorithm, similarity based on document hierarchy and Inverse Document Frequency (IDF), which intersect the documents in a cluster to determine the set of words (or phrases) shared by all the documents in the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…In order to overcome malware, concern in mobile, we propose a new framework for malware detection which is signature based technique using pattern matching. This framework uses signature number and Secure Hash Algorithm (SHA) as signature in the detection process. …”
    Get full text
    Get full text
    Get full text
    Article