Search Results - (( using (vectorisation OR vectorization) means algorithm ) OR ( java detection using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Power plant energy predictions based on thermal factors using ridge and support vector regressor algorithms by Afzal, Asif, Alshahrani, Saad, Alrobaian, Abdulrahman, Buradi, Abdulrajak, Khan, Sher Afghan

    Published 2021
    “…This work aims to model the combined cycle power plant (CCPP) using different algorithms. The algorithms used are Ridge, Linear regressor (LR), and support vector regressor (SVR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction by Zuriani, Mustaffa

    Published 2014
    “…The lvABC algorithm is introduced to overcome the local optima problem by enriching the searching behaviour using Levy mutation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…A vector quantization model that incorporate rough sets attribute reduction and rules generation with a modified version of the K-means clustering algorithm was developed, implemented and tested as a part of a speech recognition framework, in which the Learning Vector Quantization (LVQ) neural network model was used in the pattern matching stage. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Short term forecasting based on hybrid least squares support vector machines by Zuriani, Mustaffa, M. H., Sulaiman, Ernawan, Ferda, Noorhuzaimi, Mohd Noor

    Published 2018
    “…In this study, hybrid Least Squares Support Vector Machines (LSSVM) with four meta-heuristic algorithms viz. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Web Algorithm search engine based network modelling of Malaria Transmission by Eze, Monday Okpoto

    Published 2013
    “…MATLAB was used to implement the model system. The output shows the public places which habour the infected malaria vectors, and their corresponding vector densities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Ontology-based indexing of annotated images using semantic DNA and vector space model by Engku Fadzli Hasan, Syed Abdullah, Setchi, Rossitza

    Published 2014
    “…The proposed approach is evaluated by comparing the indexing achieved using the proposed semantic algorithm with results obtained using a traditional TF-based indexing in vector space model (VSM) with singular value decomposition (SVD) technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The performance of the proposed algorithms are compared with quaternion least mean square QLMS, zero-attract quaternion least mean square ZA-QLMS, and widely linear quaternion least mean square WL-QLMS algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…After classifying the time set using the canopy with the K-means algorithm and the vector representation weighted by factors, the clustering impact is assessed using purity, precision, recall, and F value. …”
    Article
  18. 18

    A Hybrid Least Squares Support Vector Machine with Bat and Cuckoo Search Algorithms for Time Series Forecasting by Mohammed, Athraa Jasim, Ghathwan, Khalil Ibrahim, Yusof, Yuhanis

    Published 2020
    “…Five evaluation metrics were utilized; mean average percent error (MAPE), accuracy, symmetric mean absolute percent error (SMAPE), root mean square percent error (RMSPE) and fitness value. …”
    Get full text
    Get full text
    Article
  19. 19

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  20. 20

    Ontology-based indexing of annotated images using semantic DNA and vector space model by Engku Fadzli Hasan, Syed Abdullah, Setchi, Rossitza

    Published 2011
    “…The proposed approach is evaluated by comparing the indexing achieved using the proposed semantic algorithm with results obtained using a traditional TF-based indexing in vector space model (VSM) with singular value decomposition (SVD) technique. …”
    Get full text
    Get full text
    Conference or Workshop Item