Search Results - (( _ application ((out algorithm) OR (bayes algorithm)) ) OR ( code application use algorithm ))*
Search alternatives:
- code application »
- bayes algorithm »
- application use »
- out algorithm »
- use algorithm »
-
1
-
2
Fast algorithm for VQ-based wavelet coding system
Published 2003Get full text
Get full text
Get full text
Proceeding Paper -
3
Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms
Published 2021Get full text
Get full text
Final Year Project -
4
Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun
Published 2025“…This study used the Naive Bayes algorithm to analyse airline reviews and customer feedback, resulting in improved service quality. …”
Get full text
Get full text
Thesis -
5
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…Three experiments were carried out to: (i) verify the applicability of the algorithms used in the proposed single-frame profilometry system; (ii) verify the applicability of the proposed phase error compensation algorithm; and (iii) compare the result of the proposed profilometry against the Mitutoyo CRYSTA-Plus M Series 196 coordinate-measuring machine (CMM). …”
Get full text
Get full text
Thesis -
6
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…A Quick Response (QR) code is a popular type of two-dimensional barcode that is widely used in various applications. …”
Get full text
Get full text
Thesis -
7
Real-coded genetic algorithm for parametric modelling of a TRMS
Published 2009Get full text
Get full text
Get full text
Proceeding Paper -
8
Comparison of hidden Markov Model and Naïve Bayes algorithms among events in smart home environment
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Phishing image spam classification research trends: Survey and open issues
Published 2020“…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. The email appears to be a dependable, appropriate, and solid communication medium for internet users. …”
Get full text
Get full text
Article -
11
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
12
Classifying good and bad websites
Published 2015“…The classification process is made easy by using set of features generated from HTML codes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
14
-
15
Another perspective in generating and using gray code word
Published 2007Get full text
Get full text
Get full text
Article -
16
Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure.
Published 2012“…Further simulations are carried out using commercial codes for some sample applications to explore impact resilient structural characteristics in the elastic region.…”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
-
20
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Cryptographic hash functions are generally the basis of a secure network and used for data integrity verification. Cryptographic hash functions carried out processes such as identity verification, file integrity checking, secure key passing, and source code version control. …”
Get full text
Get full text
Thesis
