Search Results - (( java application using algorithm ) OR ( shape classification rules algorithm ))

Refine Results
  1. 1

    Direct least squares fitting of ellipses segmentation and prioritized rules classification for curve-shaped chart patterns by Lei, I. L., Teh, Phoey Lee *, Si, Yain-Whar

    Published 2021
    “…To further enhance the efficiency of classifying chart patterns from real-time streaming data, we propose a novel algorithm called Accelerating Classification with Prioritized Rules (ACPR). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…Multilayer Perceptron (MLP) network and Radial Basis Function (RBF) network will be developed using MATLAB in which MLP network is trained with Back Propagation, Bayesian Rule and Levenberg-Marquardt learning algorithm and RBF network is trained with k-means clustering algorithm. …”
    Get full text
    Get full text
    Monograph
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications by Lim , Chee Peng

    Published 2016
    “…Further work will focus on ascertaining the stability of the FAM network in defect classification, as well as on improving the overall performance of the defect detection algorithms developed in this project. …”
    Get full text
    Monograph
  8. 8

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Also, the robust algorithm with hands of artificial immune system rules like binary hamming shape-space and advance detector structure with fast decision making to detect three abnormal behaviors such as entering the forbidden area, standing more than threshold and running was implemented The result obtained showed the improvement in the duration for each phase when compared with previous methods in image segmentation like mixture of Gaussian and behavior recognition like and/Or tree or neural networks.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering by Rashed, Alwatben Batoul

    Published 2022
    “…Among multi-objective evolutionary algorithms proposed in the literature, particle swarm optimization (PSO)-based multi-objective (MOPSO) algorithm has been cited to be the most representative. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Generating type 2 trapezoidal fuzzy membership function using genetic tuning by Khairuddin, S.H., Hasan, M.H., Akhir, E.A.P., Hashmani, M.A.

    Published 2022
    “…There are several types of inputMFs which can be introduced in FIS, commonly chosen based on the type of real data, sensitivity of certain rule implied and computational limits. This paper focuses on the construction of interval type 2 (IT2) trapezoidal shape MF from fuzzy C Means (FCM) that is used for fuzzification process of mamdani FIS. …”
    Get full text
    Get full text
    Article
  11. 11

    Generating type 2 trapezoidal fuzzy membership function using genetic tuning by Khairuddin, S.H., Hasan, M.H., Akhir, E.A.P., Hashmani, M.A.

    Published 2022
    “…There are several types of inputMFs which can be introduced in FIS, commonly chosen based on the type of real data, sensitivity of certain rule implied and computational limits. This paper focuses on the construction of interval type 2 (IT2) trapezoidal shape MF from fuzzy C Means (FCM) that is used for fuzzification process of mamdani FIS. …”
    Get full text
    Get full text
    Article
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item