Search Results - (( developing interactive patterns algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Pattern classification of human interactions from videos / Muhsin Abdul Mohammed by Muhsin , Abdul Mohammed

    Published 2018
    “…The objective of this research project is to build a machine learning model to classify human interactions from a stream of video. Being able to classify human interaction from videos is essential in the development of robotic assistance systems, video annotation, surveillance systems and many more applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN by WANG, CHIA WOON

    Published 2019
    “…Besides, common spatial pattern (CSP) is the well-known method for classification algorithm in the BCI field. …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Feature extraction: hand shape, hand position and hand trajectory path by Bilal, Sara Mohammed Osman Saleh, Akmeliawati, Rini

    Published 2011
    “…Vision-based hand posture detection and tracking is an important issue for Human to Computer Interaction applications. The performance of recognition system fIrst depends on the process of getting effIcient features to represent pattern characteristics [1]. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20