Search Results - (( developing world commitment algorithm ) OR ( java segmentation using algorithm ))

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers by Khoshkholghi, Mohammad Ali, Derahman, Mohd Noor, Abdullah, Azizol, Subramaniam, Shamala, Othman, Mohamed

    Published 2017
    “…Cloud computing has evolved with the development of large-scale data centers, including thousands of servers around the world. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Fraud detection in shipping industry based on location using machine learning comparison techniques by Ganesan Subramaniam, Mr.

    Published 2023
    “…A number of popular existing algorithms were used to execute the model developed in Rapid tool such as Naïve Bayes , Neural Net , Deep Learning, Decision Tree, Logistic Regression, SVM and k-NN. …”
    text::Thesis
  6. 6

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Review of the machine learning methods in the classification of phishing attack by Jupin, John Arthur, Sutikno, Tole, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Deris, Stiawan

    Published 2019
    “…This study focused on an algorithm that was thoroughly made and the methods in implementing this algorithm are discussed in detail.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse by Cabrera Cusi, Mariet Rosnaida, Abdelaziz, Berghout

    Published 2024
    “…This research will be the first to apply algorithmic approach and it will demonstrate that using extremism measure tools developed by the Western academic can be applied to antiIslamic extremist discourse. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse by Cabrera Cusi, Mariet Rosnaida, Abdelaziz, Berghout

    Published 2024
    “…This research will be the first to apply algorithmic approach and it will demonstrate that using extremism measure tools developed by the Western academic can be applied to anti-Islamic extremist discourse. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11