Search Results - (( code data visualization algorithm ) OR ( java application learning algorithm ))
Search alternatives:
- application learning »
- data visualization »
- learning algorithm »
- java application »
- code data »
-
1
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
2
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
3
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…This contributes to the creation large amount of data or information such as big data. Big data is a phrase for huge data sets having large, more variety and complicated element with the challenges of storing, analyzing and visualizing for further actions and obtaining the results. …”
Get full text
Get full text
Thesis -
6
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
7
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…In three dimensional simulations, post-processing poses considerable challenge since available data visualization software programs do not accommodate such a high order visualization—common data visualizers can only visualize for up to ten-node tetrahedron elements. …”
Get full text
Get full text
Thesis -
8
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
9
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
10
Challenges in multi-layer data security for video steganography
Published 2018“…The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms. …”
Get full text
Get full text
Get full text
Article -
11
The evolution and trend of chain code scheme
Published 2008“…This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
Get full text
Get full text
Get full text
Article -
12
Algorithm visualization design guidelines for mobile leaning
Published 2018“…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Enhanced Flipping Technique to Reduce Variability in Image Steganography
Published 2023“…Benchmarking; Discrete cosine transforms; Genetic algorithms; Image coding; Image enhancement; Mean square error; Signal to noise ratio; Bayes method; Cover-image; Data hidden; Embedding capacity; Flipping methods; Least significant bits; Medium; Optimisations; Variability; Visual qualities; Steganography…”
Article -
15
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
17
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
Published 2025“…It is imperative to employ resilient QR code algorithms to guarantee the security of QR code applications in response to this challenge. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
20
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…GNU OCTAVE is used for coding and visualization. GNU is a recursive acronym for "GNU's Not Unix!"…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
