Search Results - (( (variable OR variables) extraction means algorithm ) OR ( java application using algorithm ))
Search alternatives:
- extraction means »
- java application »
- means algorithm »
- using algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
2
Optimized clustering with modified K-means algorithm
Published 2021“…In order to obtain the optimum number of clusters and at the same time could deal with correlated variables in huge data, modified k-means algorithm was proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Development of an effective clustering algorithm for older fallers
Published 2022“…Using feature extraction with the t-SNE and the K-means clustering algorithm, subjects were clustered into low, intermediate A, intermediate B and high fall risk groups which corresponded with fall occurrence of 13%, 19%, 21% and 31% respectively. …”
Get full text
Get full text
Article -
4
Development Of Fall Risk Clustering Algorithm In Older People
Published 2020“…A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Characterization of water quality conditions in the Klang River Basin, Malaysia using self organizing map and K-means algorithm
Published 2015“…The self organizing map (SOM) combined with the K-means algorithm arranged the data based on the relationships of 25 variables. …”
Get full text
Get full text
Get full text
Article -
6
-
7
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
Get full text
Get full text
Final Year Project -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Improved measurement of blood pressure by extraction of characteristic features from the cuff oscillometric waveform
Published 2015“…We present a novel approach to improve the estimation of systolic (SBP) and diastolic blood pressure (DBP) from oscillometric waveform data using variable characteristic ratios between SBP and DBP with mean arterial pressure (MAP). …”
Get full text
Get full text
Get full text
Article -
10
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
HEp-2 cell images classification based on statistical texture analysis and fuzzy logic
Published 2014“…A working classification algorithm is developed and gives a mean accuracy of 84 out of 125 test images. …”
Get full text
Get full text
Conference or Workshop Item -
14
Development of a syncope classification algorithm from physiological signals acquired in tilt-table test
Published 2023“…Features that selected for the classification is mean of systolic and diastolic blood pressure, standard deviation of real variability of diastolic blood pressure, and the mean of systolic blood pressure in low and high frequency ratio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Robust remote heart rate estimation from multiple asynchronous noisy channels using autoregressive model with Kalman filter
Published 2019“…We propose a novel algorithm to estimate heart rate. Also, it can differentiate between a photo of a human face and an actual human face meaning that it can detect false signals and skip them. …”
Get full text
Get full text
Article -
16
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
17
High-Resolution Downscaling with Interpretable Relevant Vector Machine: Rainfall Prediction for Case Study in Selangor
Published 2024“…The Principal Component Analysis (PCA) technique was employed to choose relevant environmental variables as input for the machine learning model, and various imputation methods were utilized to manage missing data, such as mean imputation and the KNN algorithm. …”
Get full text
Get full text
Article -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Yield prediction of supercritical fluid extraction of Nigella sativa using neutral networks / Sarah Diana Isnin and Sitinoor Adeib Idris
Published 2025“…Yield of extraction depends on these variables: pressure, temperature, and extraction time hence were chosen as the input to the network. …”
Get full text
Get full text
Get full text
Article
