Search Results - (( java application customization algorithm ) OR ( response visualization using algorithm ))

Refine Results
  1. 1

    Analysis of auditory brainstem response test time using narrow band level specific CE-Chirp and tone burst in infants by Mohamad Noor, Amnah, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli, Rahmat, Sarah, Mohd Zain, Siti Rashidah

    Published 2025
    “…Conclusion: The use of NB LS CE-Chirp stimuli, combined with either visual or Fmp-based detection algorithms, presents a promising strategy for infant hearing assessment. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population by Chahed, Norashikin, Dzulkarnain, Ahmad Aidil Arafat, Jamaluddin, Saiful Adli

    Published 2021
    “…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3
  4. 4

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…The main finding of this study is the new algorithm of enhancing 3D terrain visualization process using Unity3D game engine. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…Several classifier models have been built by using Naive Bayes algorithm during the design and implementation phase where the model that has the highest accuracy has been chosen for this project. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…A logo placed on Quick Response (QR) code provides additional aesthetic value and visual information to the user. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
    Get full text
    Get full text
    Thesis
  10. 10

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Real-time intelligent recycle waste detection and classification using you only look once version 5 / Aiman Syafwan Amran by Amran, Aiman Syafwan

    Published 2023
    “…Because of that, this project aims to detect and classify a typed of recycled waste such paper, plastic and metal. It uses YOLOv5 object detection and classification algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A local tone mapping operator for high dynamic range images by Tung, Li Qian, Shafie, Suhaidi, Saripan, M. Iqbal

    Published 2011
    “…Due to different luminance intervals could result in overlapped reaction on the limited response in limited response range of visual system, we use scenes region splitting and merging to segment the scaled luminance, L(x, y) and perform the CLAHE in each segment with different clip limit in order to extending our visual response range to cope with the full dynamic range of high contrast. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir by Amir, Nur Hazirah

    Published 2019
    “…The template design was built using Node.js and Visual Code Studio. And it used Cordova for designing interface. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Flexible attribute classification for MDS points / Raihana Kamsiran by Kamsiran, Raihana

    Published 2010
    “…As a case study, visualization on MDS output for multiple response on color preferences is implemented. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of IoT-based automated dynamic emergency response system against fire incidents in academic building by Al-Hady, Syed Mohammed Zakaria, Islam, Md Rafiqul, Rashid, Muhammad Mahbubur

    Published 2023
    “…The integration of BIM allows the system to provide a three-dimensional visualization of the site, enabling a more efficient and effective response to fire incidents. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Boiler modeling and controller performance optimization using genetic algorithm for palm oil industry by Chew Ing Ming

    Published 2020
    “…This research developed control algorithms and Graphical User Interfaces (GUI) using Genetic Algorithm (GA) optimization analysis for the boiler control system. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…In this paper, Quick Response Code (QR code) and EAN-13 barcode was used to enhancing the previous work. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data by Karmagatri, Mulyani, Aziz, Clarisa Fezia Amanda, Asih, Wini Rizki Purnama, Jumbri, Isma Addi

    Published 2023
    “…The subsequent stages involved classification using the Naïve Bayes algorithm and word cloud visualization to identify the most commonly used words based on user responses. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Analyzing customer reviews for ARBA Travel using sentiment analysis by Abdullah, Nurulain

    Published 2025
    “…Three machine learning algorithms which are Naive Bayes, Logistic Regression, and Support Vector Machine, were implemented and evaluated using cross-validation and performance metrics such as accuracy, precision, recall, and F1- score. …”
    Get full text
    Get full text
    Student Project