Search Results - (( java application interface algorithm ) OR ( automatic identification clustering algorithm ))

Refine Results
  1. 1

    Automatic clustering of generalized regression neural network by similarity index based fuzzy c-means clustering by Husain, Hafizah, Khalid, Marzuki, Yusof, Rubiyah

    Published 2004
    “…This technique uses the conventional fuzzy c-means clustering preceded by a technique based on similarity indexing to automatically cluster input data which are relevant to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Development of Acute Stroke Lesion Segmentation Algorithm in Brain MRI using Pseudo-colour with K-means Clustering by Abang Mohd Arif Anaqi, Abang Isa

    Published 2021
    “…This study aims to develop an automatic segmentation by utilizing clustering algorithm for acute ischemic stroke lesion identification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  7. 7

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…The RX_myKarve is an extended framework from X_myKarve, which consists of the following key components: (i) an Extreme Learning Machine (ELM) neural network for clusters classification using three existing content-based features extraction (Entropy, Byte Frequency Distribution (BFD) and Rate of Change (RoC)) to improve the identification of JPEG images content and support the reassembling process; (ii) a genetic algorithm with Coherence Euclidean Distance (CED) matric and cost function to reconstruct a JPEG image from a set of deformed and fragmented clusters in the scan area. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Scorpion image segmentation system by E, joseph, Aibinu, Abiodun Musa, B.A, sadiq, Bello Salau, H, Salami, Momoh Jimoh Eyiomika

    Published 2013
    “…Despite the high rate of death as a result of scorpion sting, little report exists in literature of intelligent device and system for automatic detection of scorpion. This paper proposed a digital image processing approach based on the floresencing characteristics of Scorpion under Ultra-violet (UV) light for automatic detection and identification of scorpion. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…This research proposes a method for automatic detection of WMH in white matter (WM) tissue for MRI images. …”
    Get full text
    Get full text
    Book Section
  17. 17

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…This research proposes a method for automatic detection of WMH in white matter (WM) tissue for MRI images. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Intelligent segmentation of fruit images using an integrated thresholding and adaptive K-means method (TSNKM) by Hambali, Hamirul ’Aini, Syed Abdullah, Sharifah Lailee, Jamil, Nursuriati, Harun, Hazaruddin

    Published 2016
    “…Currently, there are several segmentation techniques which have been used in object identification such as thresholding and clustering techniques.However, the conventional techniques have difficulties in segmenting fruit images which captured under natural illumination due to the existence of non-uniform illumination on the object surface.The presence of different illuminations influences the appearance of the interest objects and thus misleads the object analysis.Therefore, this research has produced an innovative segmentation algorithm for fruit images which is able to increase the segmentation accuracy.The developed algorithm is an integration of modified thresholding and adaptive K-means method.The integration of both methods is required to increase the segmentation accuracy for fruits images with different surface colour.The results showed that the innovative method is able to segment the fruits images with high accuracy value.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    KP-Rank: a semantic-based unsupervised approach for keyphrase extraction from text data by Aman, M., Abdulkadir, S.J., Aziz, I.A., Alhussian, H., Ullah, I.

    Published 2021
    “…Automatic key concept identification from text is the main challenging task in information extraction, information retrieval, digital libraries, ontology learning, and text analysis. …”
    Get full text
    Get full text
    Article
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item