Search Results - (( developing formative identification algorithm ) OR ( java segmentation using algorithm ))
Search alternatives:
- formative identification »
- identification algorithm »
- developing formative »
- java segmentation »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
Get full text
Get full text
Thesis -
5
-
6
In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria
Published 2019“…Thus, certain group of researchers also developed machine learning tools based on support vector machine (SVM) and hidden Markov models (HMM) for the identification of novel and effective biofilm inhibitory peptides (BIPs), while others used in silico approaches for predicting and designing of antibiofilm peptides usingbidirectional recursive neural network (BRNN) and Random Forest (RF) algorithms. …”
Get full text
Get full text
Book Section -
7
HUMAN MOOD DETECTOR BY USING DIGITAL IMAGE PROCESSING
Published 2006“…These distinct criteria will he used to develop an algorithm that differentiates all the three emotions described before. …”
Get full text
Get full text
Final Year Project -
8
Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail
Published 2012“…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries. …”
Get full text
Get full text
Research Reports -
9
Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment
Published 2022“…At first, data pre-processing is performed to convert the actual data into useful format. In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
Get full text
Get full text
Get full text
Article -
10
Investment, trade and exchange rates / Noor Zahirah Mohd Sidek and Mahadzir Ismail
Published 2012“…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries.…”
Get full text
Get full text
Research Reports -
11
Development of a Production Planning and Control Software in Total Productivity Maintenance Environment
Published 2004“…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. …”
Get full text
Get full text
Thesis -
12
Lightning peak current estimation using a system identification approach
Published 2023“…A system identification-based lightning peak current estimation algorithm using upper-air radiosonde observations is developed. …”
Article -
13
A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor
Published 2023“…The analysis involved five-year data from the annual reports of 19 CSR-award winning companies in Malaysia where they were converted into a structured format, collated and summarized. Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
Get full text
Get full text
Thesis -
14
Zero distortion-based steganography for handwritten signature
Published 2018“…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
Get full text
Get full text
Get full text
Thesis -
15
Safety Analysis Of Unsignalized Intersections Under Erroneous Road Crash Data Influence
Published 2016“…This parameter was utilized in the model formation along with gap acceptance and vehicle type to estimate the probability of serious conflict. …”
Get full text
Get full text
Thesis
