Search Results - (( developing function using algorithm ) OR ( _ segmentation mining algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques by Kayalvily, Tabianan, Denis, Arputharaj, Mohd Norshahriel, Abd Rani, Sarasvathi, Nahalingham

    Published 2022
    “…This biggest Android Application (App) provides a wide variety of details on requirements such as reviews, quality, number of installs, and explanations for device functionality. This study aims to predict the ratings of Google Play Store apps using decision trees for classification in machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Improvement on rooftop classification of worldview-3 imagery using object-based image analysis by Norman, Masayu

    Published 2019
    “…The accuracy of each algorithm was evaluated using LibSVM, Bayes network, and Adaboost classifier. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Finding objects with segmentation strategy based multi robot exploration in unknown environment by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2013
    “…Two algorithms were investigated in this paper one is frontier based random search algorithm and the second is efficient algorithm based on segmentation strategy. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…On the other hand, trajectories preprocessing such as segmentation and noise points filtering is a vital step which precedes the mining task. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Denoising histological images for a better colour image segmentation / Sulastri Putit by Putit, Sulastri

    Published 2013
    “…In this study, the de-noising concept for colour image preprocessing and segmentation are proposed since these two processes has been widely accepted as an important component of the image mining in order to enhance the images.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach by Munnian, Ruthrakumar

    Published 2019
    “…However, these approaches involve complex algorithms and require voluminous dataset as the training model. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Intuitive Content Management System to Preferences Template Throughout Data Collection by using Data Mining Classification of Prediction Method by Chan, Chung Hoong, M. A., Ameedeen

    Published 2016
    “…The sophisticated mathematical algorithm applies in data mining to segment data and evaluates the probability of a future event. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Data mining and analysis for predicting electrical energy consumption by Khudhair I.Y., Dhahi S.H., Alwan O.F., Jaaz Z.A.

    Published 2024
    “…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
    Article
  13. 13

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…I used different types of optimization algorithms to improve the performance of the neural networks. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…Metaheuristic algorithms have been extensively used in numerous domains especially in engineering. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis