Search Results - (( java implementation _ algorithm ) OR ( gender classification based algorithm ))

Refine Results
  1. 1

    Gender classification on skeletal remains: efficiency of metaheuristic algorithm method and optimized back propagation neural network by Hairuddin, Nurul Liyana, Yusuf, Lizawati Mi, Othman, Mohd Shahizan

    Published 2020
    “…Thus, this paper proposed metaheuristic algorithms such as Particle Swarm Optimization, Ant Colony Algorithm and Harmony Search Algorithm based feature selection to identify the most significant features of skeleton remains. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Multichannel optimization with hybrid spectral- entropy markers for gender identification enhancement of emotional-based EEGs by Al-Qazzaz, Noor Kamal, Sabir, Mohannad K., Mohd Ali, Sawal Hamid, Ahmad, Siti Anom, Grammer, Karl

    Published 2021
    “…Finally, the k-nearest neighbors ( kNN) classification technique was used for automatic gender identification of an emotional-based EEG dataset. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Multilayer Perceptron Neural Network In Classifying Gender Using Fingerprint Global Level Features by Siti Fairuz, Abdullah, Ahmad Fadzli Nizam, Abdul Rahman, Zuraida, Abal Abas, Wira Hidayat, Mohd Saad

    Published 2016
    “…Background/Objective: A new algorithms of gender classification from fingerprint is proposed based on Acree 25mm2 square area. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Multilanguage speech-based gender classification using time-frequency features and SVM classifier by Wani, Taiba, Gunawan, Teddy Surya, Mansor, Hasmah, Ahmad Qadri, Syed Asif, Sophian, Ali, Ambikairajah, Eliathamby, Ihsanto, Eko

    Published 2021
    “…The classification is done based on features derived from the frequency and time domain processing using the Support Vector Machines (SVM) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development of Low Cost Heart Rate Monitoring Device and Classification Technique Using Fuzzy Logics Algorithm by Faili, Zahra

    Published 2016
    “…The classification of the signal being obtained is achieved through fuzzy logics algorithm inside the MATLAB Fuzzy Logic Toolbox. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Classification Of Gender Using Global Level Features In Fingerprint For Malaysian Population by Abdullah, Siti Fairuz

    Published 2016
    “…A new approach of algorithm based on the Mark Acree’s theory, focusing on fingerprint global extracted features is proposed and implemented for enhancing gender classification method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Gender Classification: A Convolutional Neural Network Approach by Shan, Sung Liew, Mohamed, Khalil-Hani, Syafeeza, Ahmad Radzi, Rabia, Bakhteri

    Published 2016
    “…An approach using a convolutional neural network (CNN) is proposed for real-time gender classification based on facial images. The proposed CNN architecture exhibits a much reduced design complexity when compared with other CNN solutions applied in pattern recognition. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Making programmer effective for software development teams: An extended study by Gilal, A.R., Jaafar, J., Abro, A., Umrani, W.A., Basri, S., Omar, M.

    Published 2017
    “…Basically, two types of decision rules were formed: rules without gender classification of programmer but they only discussed the personality types of team-leader and programmer. …”
    Get full text
    Get full text
    Article
  17. 17

    Human body radiation wave analysis and classification for gender and body segments recognition / Siti Zura A. Jalil @ Zainuddin by A. Jalil @ Zainuddin, Siti Zura

    Published 2014
    “…Multivariate analysis of variance (MANOVA) is employed to compare the differences of frequency radiation characteristics between genders. Then, the classification algorithm of A:-nearest neighbor (KNN) is employed to discriminate between genders, and between body segments. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    Embedded fuzzy classifier for detection and classification of preseizure state using real EEG data by Qidwai, U., Malik, A.S., Shakir, M.

    Published 2014
    “…Therefore, the work presented here includes embedded hardware system that works with classification algorithm on real EEG signals, in a ubiquitous setting. …”
    Get full text
    Get full text
    Conference or Workshop Item