Search Results - (( using extraction method algorithm ) OR ( java application need algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin by Zainal Abidin, Abdul Hakim

    Published 2016
    “…This research scope are to develop a computer application that can extract meaningful information in images by implement KMeans clustering algorithm 10 self capture facial image will be use as the research subject to test the algorithm that will extracting meaningful information of the person. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Machine Vision Application For Automatic Defect Segmentation In Weld Radiographs by Soo , Say Leong

    Published 2006
    “…The weld extraction algorithm was developed to locate and extract welds automatically from the intensity profiles taken across the image by using graphical analysis. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…As the components of big data continue to expand, the task of extracting useful information becomes critical. Topic extraction refers to the process of extracting main topics from the pool of news feed and a typical method to perform topic extraction is through clustering. …”
    Get full text
    Get full text
    Article
  16. 16

    Topic identification using filtering and rule generation algorithm for textual document by Nurul Syafidah, Jamil

    Published 2015
    “…The proposed filtering algorithm (PFA) will extract the most relevant terms from text and solve synonym roblem amongst the extracted terms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier by Siow, Shien Loong

    Published 2018
    “…Classic local binary pattern (LBP) is one of the most useful feature extraction methods. Moreover, K-Nearest Neighbour (K-NN) classifier is one of the widely use classifier due to its simplicity. …”
    Get full text
    Get full text
    Monograph
  18. 18
  19. 19

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Multi road marking detection system for autonomous car using hybrid- based method by Shah, Khan Bahadur

    Published 2018
    “…The Inverse Perspective Transform method was used to convert images, which were extracted from the recorded videos to bird’s-eye view images, while an image enhancement method, namely Contrast Limited Adaptive Histogram Equalization (CLAHE) was used to tackle various illumination conditions and Sobel edge detection method for detecting the road markings. …”
    Get full text
    Get full text
    Get full text
    Thesis