Search Results - (( java application customization algorithm ) OR ( knowledge integration matching algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Making a detailed knowledge of the identity and geographical distribution of plants is required for an effective agricultural biodiversity. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design and frameworks with experiment for a basic guide of theoretical isnad al-hadith authenticity examination by Ibrahim, Nuzulha Khilwani Ibrahim, Samsuri, Suhaila, Abu Seman, Muhamad Sadry, Ahmed Ali, Ahmed El-Mogtaba Bannga, Kartiwi, Mira, Hasan Basari, Abd Samad

    Published 2017
    “…This mechanism development includes the integration between Islamic knowledge and Information Technology (IT) which we proposed to develop an algorithm based on existing framework with a new element of facts probing from Islamic knowledge. …”
    Get full text
    Get full text
    Article
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Frameworks for a computational Isnad authentication and mechanism development by Ibrahim, Nuzulha Khilwani, Samsuri, Suhaila, Abu Seman, Muhamad Sadry, Ahmed Ali, Ahmed El-Mogtaba Bannga, Kartiwi, Mira

    Published 2016
    “…This mechanism development includes the integration between Islamic knowledge and Information Technology (IT) which we proposed to develop an algorithm based on existing framework with a new elements of fact probing from Islamic knowledge.The accuracy of the authentication process on the domain of knowledge of hadith will be evaluated by domain experts through an interview.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    A novel lip geometry approach for audio-visual speech recognition by Mohd Zamri, Ibrahim

    Published 2014
    “…A new method has been developed to extract lip geometry information, to perform classification and to integrate visual and speech modalities. This thesis makes several contributions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Computed tomography and echocardiography image fusion technique for cardiac images by Kalahroodi, Samaneh Mazaheri

    Published 2016
    “…In this study, a fusion system which integrates the knowledge of segmentation and intensity into registration is presented in Computed Tomography and Echocardiography images of heart. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…We develop CBIR system and conduct various retrieval experiments with the fundamental aim of comparing the accuracy during image retrieval. A new algorithm that can be used with integrated visual signatures, especially in late fusion query was introduced. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Query proof structure caching for incremental evaluation of tabled prolog programs / Taher Muhammad Ali by Taher Muhammad, Ali

    Published 2013
    “…These mechanisms are pattern-matching, treebased data structuring and backtracking. …”
    Get full text
    Get full text
    Get full text
    Thesis