Search Results - (( developing consumer aided algorithm ) OR ( java implication drops algorithm ))

Refine Results
  1. 1

    Developing framework for natphoric computer-aided web-based kansei engineering / Mohammad Bakri Che Haron by Che Haron, Mohammad Bakri

    Published 2013
    “…To realize the development of computer-aided KE system, a framework for automated KE is designed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Using Image Processing Technique in Packaging Decoration by Zhiyuan, Li

    Published 2009
    “…For the past decades, the decoration of packaging plays an important role in promoting the product to the consumer, especially related to the fast moving consumer products. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Genetic algorithm optimization of product design for environmental impact reduction / Julirose Gonzales by Julirose , Gonzales

    Published 2018
    “…The aim of this research is to develop a methodology that will aid designers to reduce the potential environmental impact of a product’s design, which does not require them to train additional skills in environmental impact analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Brain tumor image segmentation using deep learning approach by Darshan, Suresh

    Published 2022
    “…In neurosurgical, Magnetic Resonance Images (MRI) scans are used to detect cancerous cell grow thin brain called brain tumor. Application that can aid in providing automatic brain tumor segmentation is crucial as segmentation of the exact size and spatial location of these tumors are a time-consuming task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Machine learning approach for automated optical inspection of electronic components by Lim, Siew Kee

    Published 2019
    “…Rapid development in electronic industry causing a high volume of electronic components being manufactured on each day. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    A hybrid unsupervised approach toward EEG epileptic spikes detection by Khosropanah, Pegah, Ramli, Abdul Rahman, Abbasi, Mohammad Reza, Marhaban, Mohammad Hamiruce, Ahmedov, Anvarjon

    Published 2018
    “…Therefore, computer-aided approaches were employed for the purpose of saving time and increasing the detection and source localization accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Early explorations of EEG as a method for interactive evolutionary design of 3-dimensional objects by Chew, Lin Hou, James Mountstephens, Teo, Jason Tze Wi

    Published 2015
    “…The development of technology on 3D printing has attracted people of different fields to designing 3D shapes for art display, an architecture design, a prototype or even an aiding tool. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
    Get full text
    Thesis
  12. 12

    An improved diabetes risk prediction framework : An Indonesian case study by Sutanto, Daniel Hartono

    Published 2018
    “…In conclusion,DRPF is implementable as prototype and has been highly accepted by Indonesian practitioners as aid for the diagnostics of diabetes.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Automated cad system for early stroke diagnosis: Review by Azman, Izzatul Husna, Mohd Saad, Norhashimah, Samsudin, Adam, Kandaya, Shaarmila, Hamzah, Rostam Affendi, Abdullah, Abdul Rahim

    Published 2023
    “…Traditional stroke detection procedures, such as manual visual evaluation of clinical data, can be time-consuming and error-prone. Computer-aided diagnostic (CAD) technologieshave emerged as a viable option for early stroke diagnosis in recent years. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of a prototype solar-powered autonomous vehicle prototype with object detection and avoidance system using Raspberry-Pi by Ogonye, O. Solomon, Dagwa Ishaya Musa, Nurudeen Abdulhakeem Hassan, Okonkwo, Emmanuel, Kulutuye, Precious

    Published 2024
    “…In this study, the development of a solar-powered autonomous vehicle prototype with an object detection and avoidance system was implemented and achieved using Raspberry Pi. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Preprocessing method for assistive listening system by Muhammad Nur Adri, Nawi

    Published 2021
    “…So, the system algorithm is one of the most important parts of the ALS. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Preprocessing method for assistive listening system by Muhammad Nur Adri, Nawi

    Published 2021
    “…So, the system algorithm is one of the most important parts of the ALS. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data by Ting, Tin Tin, Khiew, Jie Xin, Ali Aitizaz, Lee, Kuok Tiung, Teoh, Chong Keat, Hasan Sarwar

    Published 2023
    “…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article