Search Results - (( java segmentation using algorithm ) OR ( knowledge identification process algorithm ))
Search alternatives:
- knowledge identification »
- identification process »
- java segmentation »
- process algorithm »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-specific knowledge, which consists of process operation data and the process flow sheet, has been constructed using a HYSIS process simulator. …”
Get full text
Get full text
Article -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…This research presents an efficient way to facilitate the hearing loss symptoms diagnosis process by designing a symptoms identification model that efficiently identify hearing loss symptoms based on air and bone conduction pure-tone audiometry data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
8
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
Article -
9
Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
10
Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan
Published 2015“…The implementation of Nonlinear Auto-Regressive with exogenous input (NARX) technique was then explored in this study to prove its reliability as a comprehensive system identification approach which has been cited across various recorded process identification platforms. …”
Get full text
Get full text
Thesis -
11
An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif
Published 2016“…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
Get full text
Get full text
Research Reports -
12
-
13
Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin
Published 2005“…Images are used as samples to be processed for the used of classification. In order to have a system which has an ability to learn, back-propagation learning algorithm is used. …”
Get full text
Get full text
Thesis -
14
Twisted pair cable fault diagnosis via random forest machine learning
Published 2022“…Secondly, the feature transformation, a knowledge-based method, is utilized to pre-process the fault data. …”
Get full text
Get full text
Get full text
Article -
15
A framework for malware identification based on behavior
Published 2012“…These three major components are integrated together as a cohesive unit for malware identification through knowledge storage. The experiment on the framework shows that as compared to several other related works, this framework provides better solutions on malware behavior definition, prediction and target classification. …”
Get full text
Get full text
Thesis -
16
-
17
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…However, not much attention has been paid to issues related to skyline query processing over knowledge of large-scale incomplete graph databases. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
Get full text
Get full text
Get full text
Article -
19
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
20
HUMAN MOOD DETECTOR BY USING DIGITAL IMAGE PROCESSING
Published 2006“…The identification of& person's mood is based on input from digital camera. …”
Get full text
Get full text
Final Year Project
