Search Results - (( write classification learning algorithm ) OR ( java application during algorithm ))
Search alternatives:
- classification learning »
- write classification »
- learning algorithm »
- application during »
- java application »
- during algorithm »
-
1
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…One of the most powerful machine learning methods to handle classification problems is the decision tree. …”
Get full text
Get full text
Thesis -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
3
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
Get full text
Get full text
Article -
4
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
5
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
6
-
7
CHINESE CHARACTER RECOGNITION USING SUPPORT VECTOR MACHINE
Published 2023“…Chinese characters can be considered difficult because they have many categories, complex character structures, similarities between characters, and various fonts or writing styles. There are many known machine learning algorithms for character recognition, but not all can classify Chinese characters with high speed and accuracy. …”
Article -
8
Analysis of Sentiment Based on Opinions from the 2019 Presidential Election
Published 2024“…This algorithm is well-suited for text classification tasks due to its simplicity and efficiency in handling large datasets. …”
Get full text
Get full text
Get full text
Article -
9
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
10
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
Get full text
Get full text
Article -
11
Ensemble learning using multi-objective optimisation for arabic handwritten words
Published 2021“…It is a widespread and computationally costly function due to cursive writing, a massive number of words, and writing style. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
13
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Book Chapter -
14
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Book Chapter -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
Postal address handwritten recognition using convolutional neural network / Nur Hasyimah Abd Aziz
Published 2020“…CNN was chosen as an algorithm for classification task because various studies had concluded that it is able to produce highly accurate result. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis
