Search Results - (( java implication tree algorithm ) OR ( knowledge visualization implementation algorithm ))
Search alternatives:
- visualization implementation »
- implementation algorithm »
- knowledge visualization »
- java implication »
- implication tree »
- tree algorithm »
-
1
High performance visualization of human tumor growth software
Published 2008“…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
4
Fuzzy logic controller for an automatic car gearbox shifting
Published 2009“…The Fuzzy Logic components that were implemented included the fuzzification, knowledge base, inference engines and defuzzification. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
Get full text
Get full text
Monograph -
6
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…This semantic technology is chosen due to the ability to mine, interpret and organise the knowledge. Ontology can be seen as a knowledge base that can be used to improve the image retrieval process with the aim of reducing the semantic gap between visual features and high-level semantics. …”
Get full text
Get full text
Thesis -
7
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
8
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…This research is proving the power of combination of discrete and continuous wavelet transform for achieving high accuracy in single trial detection and visualization of P300. Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
9
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
10
Review on computational strategies for bi-layered metal powder compaction
Published 2024“…A scrutinize part is the implementation of algorithm to describe powder behavior under double loading as well as to relate with other mechanical variables that eventually require expertise on computational plasticity knowledges involving horizontal contacts. …”
Get full text
Get full text
Get full text
Book Section -
11
-
12
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Fuzzy-Rough Nearest Neighbours (FRNN) technique is an outstanding technique to model uncertainty under an imperfect data condition. The current implementation of FRNN technique is not designed for incremental learning problem because there is no update function to incrementally reshape and reform the existing knowledge granules. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
14
Computed tomography and echocardiography image fusion technique for cardiac images
Published 2016“…Also, different performance metrics are implemented to examine the performance of the proposed fusion system. …”
Get full text
Get full text
Get full text
Thesis -
15
Fusion of airborne LiDAR with multispectral SPOT 5 image for enhancement of feature extraction using Dempster–Shafer theory
Published 2014“…The two products were fused using the DST algorithm, and the accuracy of the classification was assessed. …”
Get full text
Get full text
Article
