Search Results - (( using vector does algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…This research combines the ontology and text representation for classification by developing five algorithms. The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Five phase space vector modulation voltage source inverter using large vector only / Mohd Syazimie Zulkifli by Zulkifli, Mohd Syazimie

    Published 2012
    “…Furthermore, this study does not include the zero vectors at the time switching and only active vector were used for the time switching for each sector. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm by Yusof, Norzihani, Rosidi, Siti Aishah Rosidi, Ibrahim, Nuzulha Khilwani Ibrahim, Ahmed Ali, Ahmed El-Mogtaba Bannga

    Published 2020
    “…The classification for this thematic Hadith dataset is implemented using Rapidminer, a machine learning tool using Naïve Bayes and Support Vector Machine (SVM) methods. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2013
    “…The proposed algorithm has been applied to EgyptSat-1. The satellite is switched from earth-pointing to sun-pointing mode using the estimated sun-vector. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9
  10. 10

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…Thus, the proposed algorithms proved to be superior over the other algorithms in all aspects.…”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Supervised ANN classification for engineering machined textures based on enhanced features extraction and reduction scheme by Ashour, Mohammed Waleed, Khalid, Fatimah, Al-Obaydee, Mohammed

    Published 2013
    “…Secondly reducing the numbers of extracted features vector using the concept of Principal Component Analysis (PCA) for features selection and vectors dimensionality reduction. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Surface Normals with Modular Approach and Weighted Voting Scheme in 3D Facial Expression Classification by Hamimah, Ujir, Spann, Michael

    Published 2014
    “…New insight in facial expression analysis is found particularly when no intensity information is provided. Surface normals does has a potential to be used as the feature vectors to classify six basic expressions.…”
    Get full text
    Get full text
    Article
  19. 19

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…In our framework we use Ad hoc On demand Distance Vector (AODV) because it is the most suitable routing protocol for VANET and the current routing protocols have mostly been designed for MANETs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Optimized feature construction methods for data summarizations of relational data by Sze, Florence Sia Fui

    Published 2014
    “…The summarized data will then be fed to any classification algorithm to perform the classification task. A classification task is commonly performed to discover frequent patterns in the data that can be used to classify new unknown data. …”
    Get full text
    Get full text
    Get full text
    Thesis