Search Results - (( java segmentation using algorithm ) OR ( basic reasoning based algorithm ))
Search alternatives:
- java segmentation »
- using algorithm »
- basic reasoning »
- reasoning based »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. …”
Get full text
Get full text
Undergraduates Project Papers -
6
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm is implemented in the Gene Ontology browser named basic UTMGO to overcome the weaknesses of the existing Gene Ontology browsers which use a conventional approach based on keyword matching. …”
Get full text
Get full text
Get full text
Article -
7
Performance optimization method in OFDM based on majorization and minimization technique
Published 2019“…Basically, TQM principles are based on time-domain OFDM symbols Majorization and Minimization (MM) technique. …”
Get full text
Get full text
Get full text
Article -
8
A fuzzy case-based reasoning model for software requirements specifications quality assessment
Published 2023“…The iSRS utilizes a Case-Based Reasoning (CBR) model in carrying out the SRS quality analysis based on the experience of the previously analyzed cases. …”
Article -
9
Scheduling of batch process plant / Aladin Awang Hamat
Published 1999“…This is because, nowadays industries produce higher quality products in small quantities, thus to justify the economie cost of continuous production equipment. For that reason, this research is done based on the development of scheduling, involving algorithm and hardware. …”
Get full text
Get full text
Thesis -
10
Adaptive circular enclosure colour distribution geometrical model utilizing point-in-polygon for segregation between lips and skin pixels
Published 2012“…This paper is inspired from various boundary determination techniques which are used for segregating colours between background, skin and lips. Basic concept for this technique is based on colour segmentation with CIELAB colourspace utilized for justifiable reasons. …”
Get full text
Get full text
Conference or Workshop Item -
11
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…The simulation results show that the DRFC algorithm allocates the available bandwidth fairly among the contending ABR sources, while achieving high link utilisation with reasonable growth of queues. …”
Get full text
Get full text
Thesis -
12
Development of high speed booth multiplier with optimized stuck-at fault implementation
Published 2002“…In general, there are two basic approaches to enhance the speed of the multiplier, Booth Algorithm and the Wallace Tree compressors or counter. …”
Get full text
Get full text
Conference or Workshop Item -
13
Fingerprint reconstruction based on improved directional image
Published 2005Get full text
Get full text
Thesis -
14
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…From the results, it is found that the proposed improved algorithm is effective in solving the benchmark instances compared to when no improvement is implemented and with a reasonable increase in computational costs. …”
Get full text
Get full text
Get full text
Thesis -
16
UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim
Published 2009“…A heuristic is a method that might not always find the best solution but is guaranteed to find a good solution in reasonable time. The proposed heuristic algorithm is based on the simple greedy search, that guide the search efficiently and able to find good solutions. …”
Get full text
Get full text
Thesis -
17
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…We proposed two novel search algorithms named QuickFlood and HybridFlood. QuickFlood combines two food-based searches; fooding and teeming. …”
Get full text
Get full text
Thesis -
18
Deterministic Automatic Test Pattern Generation for Built-In Self Test System
Published 2006“…To ease testing, digital systems are commonly designed with Built-In Self Test facility. For this reason, development of test pattern for BIST based on combination of Linear Feedback Shift Register (LFSR) and deterministic ATPG (DATPG) approach could provide more solutions, such as reduce testing time, high fault coverage and low area overhead. …”
Get full text
Get full text
Thesis -
19
-
20
Malay continuous speech recognition using continuous density hidden Markov model
Published 2007“…Hidden Markov Model (HMM) based statistical modeling is used in Malay speech recognition. …”
Get full text
Get full text
Get full text
Thesis
