Search Results - (( developing consumer aided algorithm ) OR ( java implication bat algorithm ))
Search alternatives:
- developing consumer »
- java implication »
- aided algorithm »
- implication bat »
- consumer aided »
- bat algorithm »
-
1
Developing framework for natphoric computer-aided web-based kansei engineering / Mohammad Bakri Che Haron
Published 2013“…To realize the development of computer-aided KE system, a framework for automated KE is designed. …”
Get full text
Get full text
Thesis -
2
Using Image Processing Technique in Packaging Decoration
Published 2009“…For the past decades, the decoration of packaging plays an important role in promoting the product to the consumer, especially related to the fast moving consumer products. …”
Get full text
Get full text
Thesis -
3
Genetic algorithm optimization of product design for environmental impact reduction / Julirose Gonzales
Published 2018“…The aim of this research is to develop a methodology that will aid designers to reduce the potential environmental impact of a product’s design, which does not require them to train additional skills in environmental impact analysis. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Ischemic Stroke Detection System With Computer Aided Diagnostic Capability
Published 2017Get full text
Get full text
Monograph -
6
Brain tumor image segmentation using deep learning approach
Published 2022“…In neurosurgical, Magnetic Resonance Images (MRI) scans are used to detect cancerous cell grow thin brain called brain tumor. Application that can aid in providing automatic brain tumor segmentation is crucial as segmentation of the exact size and spatial location of these tumors are a time-consuming task. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Machine learning approach for automated optical inspection of electronic components
Published 2019“…Rapid development in electronic industry causing a high volume of electronic components being manufactured on each day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Classification and visualization of Malaysian fast food restaurant chain based on twitter sentiment analysis / Muhammad Hafeez Hakimi Muhd Zahidi Ridzuan
Published 2023“…This project uses an algorithm called Naïve Bayes and the visualization is aided by the Plotly library in Python. …”
Get full text
Get full text
Thesis -
9
A hybrid unsupervised approach toward EEG epileptic spikes detection
Published 2018“…Therefore, computer-aided approaches were employed for the purpose of saving time and increasing the detection and source localization accuracy. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Early explorations of EEG as a method for interactive evolutionary design of 3-dimensional objects
Published 2015“…The development of technology on 3D printing has attracted people of different fields to designing 3D shapes for art display, an architecture design, a prototype or even an aiding tool. …”
Get full text
Get full text
Get full text
Article -
11
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
Get full text
Thesis -
12
An improved diabetes risk prediction framework : An Indonesian case study
Published 2018“…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
Get full text
Get full text
Get full text
Thesis -
13
Automated cad system for early stroke diagnosis: Review
Published 2023“…Traditional stroke detection procedures, such as manual visual evaluation of clinical data, can be time-consuming and error-prone. Computer-aided diagnostic (CAD) technologieshave emerged as a viable option for early stroke diagnosis in recent years. …”
Get full text
Get full text
Get full text
Article -
14
Optimum Colour Space Selection for Ulcerated Regions using Statistical Analysis and Classification of Ulcerated Frames from WCE Video Footage
Published 2015“…Therefore, it is crucial to develop a computer aided intelligent algorithm to process the huge number of WCE frames. …”
Get full text
Get full text
Conference or Workshop Item -
15
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
16
Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi
Published 2024“…In this study, the development of a solar-powered autonomous vehicle prototype with an object detection and avoidance system was implemented and achieved using Raspberry Pi. …”
Get full text
Get full text
Get full text
Article -
17
Optimum Colour Space Selection for Ulcerated Regions Using Statistical Analysis and Classification of Ulcerated Frames from WCE Video Footage
Published 2015“…Therefore, it is crucial to develop a computer aided intelligent algorithm to process the huge number of WCE frames. …”
Get full text
Get full text
Book Section -
18
Preprocessing method for assistive listening system
Published 2021“…So, the system algorithm is one of the most important parts of the ALS. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Preprocessing method for assistive listening system
Published 2021“…So, the system algorithm is one of the most important parts of the ALS. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article
