Search Results - (( java application mining algorithm ) OR ( chain detection method algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Based on the analysis, the algorithm of neural network classifier corner detector for FCC was found to have more potentials in terms of accuracy of corner detection and suitability of the chain code. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…In the second phase the machine detect any missing data to replace it with correct attribute and dealt with passive narrator chain. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Optimizing high-density aquaculture rotifer Detection using deep learning algorithm by Alixson Polumpung, Kit Guan Lim, Min Keng Tan, Sitti Raehanah Muhamad Shaleh, Renee Ka Yin Chin, Kenneth Teo Tze Kin

    Published 2022
    “…In this paper, we present the method and performance to detect rotifer Brachionus plicatilis in 1ml sample automatically using deep learning algorithm YOLOv3. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…Consequently, the techniques for combining existing normalisation methods, namely feature extension, chaining and stacking were proposed in the research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Optimizing the light gradient-boosting machine algorithm for an efficient early detection of coronary heart disease by Temidayo Oluwatosin Omotehinwa, David Opeoluwa Oyewola, Ervin Gubin Moung

    Published 2024
    “…This aimed to optimize the Light Gradient-Boosting Machine (LightGBM) algorithm to enhance its performance and accuracy in the early detection of CHD, providing a reliable, cost-effective, and non-invasive diagnostic tool. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Effect of pre-determined maintenance repair rates on the health index state distribution and performance condition curve based on the Markov Prediction Model for sustainable transf... by Yahaya M.S., Azis N., Selva A.M., Kadir M.Z.A.A., Jasni J., Hairi M.H., Ghazali Y.Z., Talib M.A.

    Published 2023
    “…algorithm; detection method; index method; maintenance; management practice; Markov chain; numerical method; numerical model; performance assessment; probability; repair; strategic approach…”
    Article
  18. 18

    Multiplex real-time PCR detection of respiratory viruses in lower respiratory tract infections in children by Zetti Zainol Rashid, Lee, Pei Chuan, Umi Kalsom Ali, Muttaqillah Najihan Abdul Samat, Tang, Swee Fong

    Published 2018
    “…Molecular methods detect more viral aetiologies than conventional methods, with simultaneous detection of multiple respiratory viruses. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
    Get full text
    Get full text
    Article
  20. 20

    Survival modelling, missing values and frailty with application to cervical cancer data / Nuradhiathy Abd Razak by Nuradhiathy, Abd Razak

    Published 2016
    “…The performance of several methods for handling missing values is studied including the Expectation-Maximization (EM) algorithm by method of weight, hot deck, multiple imputation by chained equation with predictive mean matching (MICE-PMM) and complete case analysis methods for the Weibull data. …”
    Get full text
    Get full text
    Thesis