Search Results - (( java implementation learning algorithm ) OR ( building visualization using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms by Ahmed, Tarem, Ahmed, Supriyo, Pathan, Al-Sakib Khan

    Published 2014
    “…A distributed network of wireless visual sensors was simulated using a number of high-resolution webcams setup in the hallways of an academic building. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Visual codebook analysis in image understanding / Hoo Wai Lam by Hoo, Wai Lam

    Published 2015
    “…Visual codebook, that act as a ‘dictionary’ for images, has been widely used in the literature. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Autonomous Target Tracking Of A Quadrotor UAV Using Monocular Visual-Inertial Odometry by Chin, Mun Xue

    Published 2018
    “…Referring to and improving the state-of-the-art CV algorithms, there is a newly formulated approach to detect the designed visual marker. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Visual Public-Key Cryptosystems. by Samsudin, Azman

    Published 2012
    “…Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.…”
    Get full text
    Get full text
    Monograph
  13. 13

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Graphics, audio-visuals and interaction (GAI) based augmented reality (AR) system for symbian and android smartphone by Md. Abdullah, Al - Jubair

    Published 2012
    “…Audio video API of Symbian and Android were used to build the GAI based audio video module. Color picking algorithm was used to build the interactions module. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…The first part of the algorithm aims to build a rotation table using hash function within scramble phase and descramble phase to generate a scrambled (rotated) image and the retrieved image. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Visualizations used in the system are circular bar plot, word cloud and bar chart where each visualization conveys different purpose. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments by Gadipudi, N., Elamvazuthi, I., Lu, C.-K., Paramasivam, S., Su, S.

    Published 2022
    “…Traditional visual odometry algorithms require the careful fabrication of state-of-the-art building blocks based on geometry. …”
    Get full text
    Get full text
    Article
  19. 19

    Lightweight spatial attentive network for vehicular visual odometry estimation in urban environments by Gadipudi, N., Elamvazuthi, I., Lu, C.-K., Paramasivam, S., Su, S.

    Published 2022
    “…Traditional visual odometry algorithms require the careful fabrication of state-of-the-art building blocks based on geometry. …”
    Get full text
    Get full text
    Article
  20. 20

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise