Search Results - (( topic classification clustering algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Cluster and classification analysis are very interesting data mining topics that can be applied in many fields. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Social networks content analysis for peacebuilding application by Shaikh, Muniba, Salleh, Norsaremah, Abdullah, Lili Marziana

    Published 2015
    “…The proposed framework shows that twitter is most popular SN for Pb CA purpose and proposed framework presents the searching criteria and custom filters to extract the topic specific data. Moreover, the research proposes to use lexical analysis (LA) method to extract the SNs features, 1st order context representation (CR) technique to represent the context of the extracted features, DBSCAN clustering algorithm for data management by making different clusters, ranking algorithm, Log likelihood ratio and SVM techniques for content analysis and classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Activity recognition using optimized reduced kernel extreme learning machine (OPT-RKELM) / Yang Dong Rui by Yang , Dong Rui

    Published 2019
    “…As a consequence, HAR has been identified as a potential topic for healthcare assessment systems. One of the major research problems is the computation resources required by machine learning algorithm used for classification for HAR. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Exploring the impact of social media on political discourse: a case study of the Makassar mayoral election by Jufri, Aedah, Abd Rahman, Suarga, .

    Published 2024
    “…To increase the accuracy and efficiency of text mining operations, especially in result validation, text clustering, and classification, the k-means algorithm and support vector machines (SVM) were used. …”
    Get full text
    Get full text
    Get full text
    Journal
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item