Search Results - (( java implementation bayes algorithm ) OR ( using code window algorithm ))

Refine Results
  1. 1

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…In this system, the layout was designed under two categories which are the standard bay size and the small bay size to increase the parking bays. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Line clipping based on parallelism approach and midpoint intersection by Hattab, Adel Salem Abdullah, Yusof, Yuhanis

    Published 2014
    “…The main property is considered in this algorithm is the parallelism with window boundary to define the clipped line.For parallel lines with window boundaries no need to use intersection point method to find the coordinates of the end points of the clipped line.Midpoint algorithm is used to determine the intersection point with the clipped boundary for non-parallel lines. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    PCB defect detection system using run-length encoding by Zakaria, Muhammad Anif

    Published 2017
    “…Both of the PCB test and PCB original images was created an analysis window. Each of the analysis windows contents the RLE code. …”
    Get full text
    Get full text
    Student Project
  6. 6

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Spectrum efficiency enhancement in dynamic space coded multiple access (DSCMA) system by Ng, Chee Kyun, Noordin, Nor Kamariah, Mohd Ali, Borhanuddin, Jamuar, Sudhanshu Shekhar, Ismail, Mahamod

    Published 2010
    “…These codes are used together with a novel algorithm called dynamic space code (DSC), which will decrease the code length so that the spectrum efficiency can be increased. …”
    Get full text
    Get full text
    Article
  10. 10

    Development of optimum window size in tropical climate using computational fluid dynamics and experimental works by Wahhad, Ali Mohamad

    Published 2016
    “…Data analysis revealed that the predicted mean vote (PMV) standard equation was thermally neutral.The objective of this work is to design window sizes for tropical climates using CFD code FLUENT version 6.3 and ANSYS for geometric generation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    FPGA Implementation of Emergency Door Car Entry System by Zaini Sulaiman

    Published 2008
    “…Altera® Quartus II is used to create the source code and download it into the FPGA board. …”
    Get full text
    Learning Object
  12. 12

    Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels by Farajalla Ali, Nawafil Abdulwahab, Alshaikhli, Imad Fakhri Taha

    Published 2021
    “…The algorithm was evaluated by implementing PSNR (Peak Signal-to-noise ratio) and MSE (Mean Square error), and MATLAB was used to build the code required to process and analyze the data.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings by Abd-EI-Raouf, Hany Ehsan

    Published 2005
    “…The hybrid technique enables us to efficiently handle wire type configurations using a MoM type of code, while we use the proposed domain decomposition FDTD method to analyze inhomogeneous structures, such as buildings with doors, windows and electronic. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Additionally, IPO_Agent not only produces the same PAC’s output results, but also generates module number and represents these results in another window. Finally,Algorithm_Agent employs the extracted information provided by IPO_Agent to produce the pseudo-code of the given problem and shows it in separate window. …”
    Get full text
    Get full text
    Thesis
  15. 15

    WIMAX TESTBED by KOH , MINGHAO

    Published 2008
    “…This project also takes the first few steps of hardware implementation by using Real Time Workshop to convert the Simulink model into C codes which run outside MATLAB. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    On-chip communication system modeling approach for reability analysis focusing on functional failures by Forooshani, Arash Abtahi

    Published 2012
    “…Using 4-PAM modulation as the signaling scheme together with three variations of Hamming block codes, the proposed on/off chip communicationsystem model is compared to AWGN model in terms of bit error ratio. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Design and Analysis of a Dynamic Space-Code Multiple Access with Large Area Synchronous Scheme Using the Smart Antenna System by Ng, Chee Kyun

    Published 2007
    “…The size of IFW is adaptable with the size of smart antenna beamwidth through dynamic space code (DSC) algorithm. Hence, this double signatures scheme forms a novel multiple access scheme called Dynamic Space Code Multiple Access (DSCMA) system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…By coding the two algorithms, the proposed algorithm improves the execution time and memory consumption with a percentage of about 58% and 93% respectively. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Statistical Approach for Image Retrieval by Khor, Siak Wang

    Published 2007
    “…This technique, formally known as Image Retrieval Using Statistical-based Approach is based on the idea of grouping pixels with similar colour codes within an image. …”
    Get full text
    Get full text
    Thesis