Search Results - (( write classification learning algorithm ) OR ( java application model algorithm ))
Search alternatives:
- classification learning »
- write classification »
- learning algorithm »
- application model »
- java application »
- model algorithm »
-
1
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…One of the most powerful machine learning methods to handle classification problems is the decision tree. …”
Get full text
Get full text
Thesis -
2
-
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
Get full text
Get full text
Article -
6
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
7
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
CHINESE CHARACTER RECOGNITION USING SUPPORT VECTOR MACHINE
Published 2023“…Chinese characters can be considered difficult because they have many categories, complex character structures, similarities between characters, and various fonts or writing styles. There are many known machine learning algorithms for character recognition, but not all can classify Chinese characters with high speed and accuracy. …”
Article -
10
Analysis of Sentiment Based on Opinions from the 2019 Presidential Election
Published 2024“…This algorithm is well-suited for text classification tasks due to its simplicity and efficiency in handling large datasets. …”
Get full text
Get full text
Get full text
Article -
11
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
14
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…For further verification, two Supervised Machine Learning (SML) and three Unsupervised Machine Learning (UML) algorithms were experimented. …”
Get full text
Get full text
Article -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
-
17
-
18
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
19
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
20
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis
