Search Results - (( java location based algorithm ) OR ( basic extraction process algorithm ))

Refine Results
  1. 1

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4
  5. 5

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…The purpose of the project is basically to extract and identify each object elements in an image picture. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim by Ibrahim, Erman

    Published 2007
    “…The usefiil information can be used as a basic idea towards project methodology whereby a detail development process presented. …”
    Get full text
    Thesis
  11. 11
  12. 12

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…From each successful contour segmentation, four basic morphological features are extracted to create the Harumanis data set. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Classification of herbs plant diseases via hierarchical dynamic artificial neural network by Abdullah, Lili Nurliyana, Khalid, Fatimah, Borhan, N.M.

    Published 2010
    “…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
    Get full text
    Get full text
    Article
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Fingerprint reconstruction based on improved directional image by Othman, Mohamad Kharulli

    Published 2005
    “…Extracting minutiaes have been found to be an error prone process, depending on the quality of the fingerprint image. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework by Abdullah, Lili Nurliyana, Khalid, Fatimah, Borhan, N.M.

    Published 2011
    “…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
    Get full text
    Get full text
    Article
  18. 18

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…For identification, the image processing involves process of image pre-processing, feature extraction and classification. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise