Search Results - (( website presentation method algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- presentation method »
- method algorithm »
- java application »
-
1
Determining number of clusters using firefly algorithm with cluster merging for text clustering
Published 2015“…Such a scenario requires a dynamic text clustering method that operates without initial knowledge on a data collection.In this paper, a dynamic text clustering that utilizes Firefly algorithm is introduced.The proposed, aFAmerge, clustering algorithm automatically groups text documents into the appropriate number of clusters based on the behavior of firefly and cluster merging process. …”
Get full text
Get full text
Book Section -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Schedule of tour guide using genetic algorithm / Nur Aishah Rosli
Published 2017“…The data collection was performed by using the method of interviewing experts or any official resource such as a Tourism Malaysia website. …”
Get full text
Get full text
Thesis -
4
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…This thesis will present the design, development and analysis of performance on a developed Double Stage Filter (DSF) algorithm and other existing stereo matching algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Vader lexicon and support vector machine algorithm to detect customer sentiment orientation
Published 2023“…The objective of this method is to determine the level of customer orientation present within the dataset. …”
Get full text
Get full text
Get full text
Article -
6
K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm
Published 2025“…Phishing detection is considered a critical problem in cybersecurity, and utilising machine learning with an efficient feature selection method for precisely identifying malicious websites is deemed the most critical challenge. …”
Get full text
Get full text
Get full text
Article -
7
Fast shot boundary detection based on separable moments and support vector machine
Published 2021“…Moreover, for the proposed SBD algorithm, a comparative study is performed with state-of-the-art algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli
Published 2022“…Fuzzy Logic algorithms have adapted to fit a wide range of uses. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…The Filtering framework provides foundation in developing the algorithm for searching tools. This algorithm can be implemented in both website and search engine.…”
Get full text
Get full text
Research Reports -
11
Detection of corneal arcus using rubber sheet and machine learning methods
Published 2019“…The benchmark of the classification algorithm for CA is needed to analyze the optimal output of the algorithm. …”
Get full text
Get full text
Thesis
