Search Results - (( write classification technique algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- classification technique »
- implementation during »
- write classification »
- java implementation »
- during algorithm »
-
1
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…After ensuring that the classification technique was able to accomplish this work, Hybrid Genetic Random Forests (HGRF) was introduced as a new ensemble classifier based on a Random Forest algorithm, but altered slightly with some innovations. …”
Get full text
Get full text
Get full text
Thesis -
2
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…Classification is a data mining technique used to classify varied data types according to a specific criterion. …”
Get full text
Get full text
Thesis -
3
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…It considers both presence and absence features thus it measured the form of linguistic features that reflected essay quality. MMB Technique only required a small size of training data. (3) Prediction process of writing style using Multiple Linear Regression (MLR) Algorithm. …”
Get full text
Get full text
Thesis -
4
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
7
Study on crack detection using image processing techniques and deep learning – a survey
Published 2020“…The purpose of this writing is to study and understand the existing crack detection techniques using image processing. …”
Get full text
Get full text
Article -
8
Arabic Calligraphy Classification using Triangle Model for Digital Jawi Paleography Analysis
Published 2011“…The features are extracted from the triangle to represent the Jawi (Arabic writing in Malay language) characters. Experiments have been conducted using seven Unsupervised Machine Learning (UML) algorithms and one Supervised Machine Learning (SML). …”
Get full text
Get full text
Conference or Workshop Item -
9
Segmentation techniques for Arabic handwritten: a review
Published 2024“…The paper will also touch on the classification of segmentation algorithms originally designed for modern documents, illustrating their adaptation in document processing. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Features Extraction of Arabic Calligraphy using extended Triangle Model for Digital Jawi Paleography Analysis
Published 2013“…Jawi is the original Malay writing based on Arabic characters. The technique proposed models triangles on images and extracts features from them. …”
Get full text
Get full text
Article -
11
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
12
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
13
Cluster validity of Xie and Beni and the partition coefficient indexes for fuzzy c-means clustering / Nor Azrin Ahmad Mustaffa
Published 2010“…Therefore, segmentation of mammographic images is an important phase in image analysis that can be further applied to other algorithms for specific tasks such as the detection and classification of breast anomalies. …”
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A New Swarm-Based Framework for Handwritten Authorship Identification in Forensic Document Analysis
Published 2014“…In this chapter, feature selection is explored in order to find the most unique individual significant features which are the unique features of individual’s writing. This chapter focuses on the integration of Swarm Optimized and Computationally Inexpensive Floating Selection (SOCIFS) feature selection technique into the proposed hybrid of Writer Identification framework 386 S.F. …”
Get full text
Get full text
Book Chapter -
17
A new swarm-based framework for handwritten authorship identification in forensic document analysis
Published 2014“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Book Chapter -
18
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
19
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
20
Invariants discretization for individuality representation in handwritten authorship
Published 2008“…Many researches have been done to develop algorithms for extracting good features that can reflect the authorship with good performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
