Search Results - (( java segmentation using algorithm ) OR ( knowledge creating using algorithm ))
Search alternatives:
- knowledge creating »
- java segmentation »
- using algorithm »
- creating using »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Multilingual Sentiment Analysis From Students Feedback: Optimal Techniques And Resources For Bengali Lingual Data
Published 2024thesis::doctoral thesis -
6
Hybrid genetic random forest algorithm for the identification of ISI-indexed articles / Mohammadreza Moohebat
Published 2017“…In the past, the growth of human knowledge was slow and limited. For instance, when an innovation was created in the 18th century in the UK, it took several months or even years for the news to reach other parts of the globe. …”
Get full text
Get full text
Get full text
Thesis -
7
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009“…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
10
Developing an intelligent system to acquire meeting knowledge in problem-based learning environments
Published 2006“…Similarly, the algorithm proposed in MALESAbrain can, be used to deal, the problem of conducting a meeting among learners to solve problems. …”
Get full text
Get full text
Get full text
Article -
11
Cryptanalysis in cryptographic algorithm design
Published 2006“…Therefore, a cryptographic algorithm has to endure cryptanalysis to ensure that it is safe for private or public use. …”
Get full text
Conference or Workshop Item -
12
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…In the Requirement Analysis we managed to create the use case diagram and the system specification. …”
Get full text
Get full text
Thesis -
13
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. …”
Get full text
Get full text
Thesis -
14
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
15
-
16
-
17
Medical sign language translator in healthcare facility using yolo version 7 algorithm / Nurin Qistina Zaini
Published 2023“…For the recognized sign language gesture, the algorithm creates a bounding box with a label. The hand signs are then translated into words, allowing medical staff to clearly understand the conversation. …”
Get full text
Get full text
Thesis -
18
Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot
Published 2018“…The outcomes indicate that the proposed computer vision techniques and computational mapping algorithms for human perceptual map building are robust and useful. …”
Get full text
Get full text
Thesis -
19
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
20
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis
