Search Results - (( java implementation tree algorithm ) OR ( pattern reading patterns algorithm ))

Refine Results
  1. 1

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. These algorithms could not compensate for the change or variation on the inspected parts dynamically. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test by CH’NG , MING ZONG

    Published 2017
    “…Through the analysis of the fault patterns and other algorithm, it was found that multiple read operation within a single MARCH element from MARCH-NU algorithm can aid in the identification of the Read Destructive Fault whereas having HOLD time in the MARCH 9N algorithm would expose the Data Retention Fault. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    MELODY TRAINING WITH SEGMENT-BASED TILT CONTOUR FOR QURANIC TARANNUM by Hanum, H.M., Abas, L.H.M., Aziz, A.S., Bakar, Z.A., Diah, N.M., Ahmad, W.F.W., Ali, N.M., Zamin, N.

    Published 2021
    “…A tarannum training prototype is built to test similarity between a userâ��s recitation and the trained patterns. To identify similarity between a pair of verse-contours, the application employs a shape-based contour similarity algorithm. …”
    Get full text
    Get full text
    Article
  6. 6

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…Patterns used in this experiment are connected digits of 11 speakers spoken in read mode in lab environment and spontaneous mode in classroom environment. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An Intelligent Detection System for Rheumatoid Arthritis (RA) Disease using Image Processing by Hajyyev, Abdyrahym

    Published 2014
    “…Out of five types of staining patterns nucleolar and centromere share similar visual appearance and the same is true to homogeneous, fine-speckled, coarse-speckled patterns. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals by Muhammad Ikmal Hakim Shamsul Bahrin, Hazlina Md Yusof, Shahrul Na’im Sidek, Aimi Shazwani Ghazali

    Published 2024
    “…It was also identified that the frequently performed exploratory procedures among participants were contour following and lateral motions. However, their reading strategies were too random and lacked systematic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Recent applications in quantitative methods and information technology by Aziz, Nazrina, Abdul-Rahman, Syariza, Zainal Abidin, Norhaslina

    Published 2018
    “…The analyses in each chapter are explained in detail with samples of real applications in daily life to assist readers to appreciate theoretical, algorithm and mathematical formulations.Prior to reading this book, readers are advised to have some basic foundation in statistical sampling, tabu search approach, neural network, algorithms, and mathematical formulation. …”
    Get full text
    Get full text
    Book
  12. 12

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…Based on the new representation, the documents are then subjected to the clustering algorithm itself, which is Fuzzy c-Means algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Nurul Syafiqah, Zaidi, Al Fahim, Mubarak Ali, Ahmad Firdaus, Zainal Abidin, Ibrahim, Adamu Abubakar, Aldharhani, Ghassan Saleh, Mohd Faizal, Ab Razak

    Published 2025
    “…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The flexible and intelligent recognition is not only depending on the informatiOn that belonged by target object,but also is supported by other information, including past knowledge and contextual information.For an example, when we read a book, we do not usually seem to read it -by recognizing each character one by one. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An early investigation into raised-line tactile graphics reading behavior among blind and visually impaired individuals by Shamsul Bahrin, Muhammad Ikmal Hakim, Md Yusof, Hazlina, Sidek, Shahrul Na'im, Ghazali, Aimi Shazwani

    Published 2024
    “…It was also identified that the frequently performed exploratory procedures among participants were contour following and lateral motions. However, their reading strategies were too random and lacked systematic patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Zaidi, Nurul Syafiqah, Mubarak Ali, Al-Fahim, Ahmad, Firdaus, Abubakar, Adamu, AlDharhani, Ghassan Saleh, Ab Razak, Mohd Faizal

    Published 2025
    “…A model was trained via the forest penalizing attributes (ForestPA) algorithm, which can classify profiles into real or fake profiles on the basis of their behavioral patterns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20