Search Results - (( java segmentation using algorithm ) OR ( knowledge level using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5
  6. 6

    E4ML: Educational Tool for Machine Learning by Sainin, Mohd Shamrie, Siraj, Fadzilah

    Published 2003
    “…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    The Security Level Of Two Xored-based A5 Crypto System by Nur Hafiza Zakaria, Kamaruzzaman Seman, Ismail Abdullah

    Published 2024
    “…Five (5) statistical tests were used to test the strength of the algorithm. Both of the proposed modified XORed-based A5/1 algorithms successfully passed the five (5) statistical tests.…”
    Article
  11. 11

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13
  14. 14
  15. 15

    Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham by Amir Sham, Norfarhana Syamiza

    Published 2017
    “…The examination questions will measure the understanding and knowledge level of students. However, there are differences in background among computer science diploma level students. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Online DE optimization for Fuzzy-PID controller of semi-active suspension system featuring MR damper by Ahmed, Hesham, As’arry, Azizan, Hairuddin, Abdul Aziz, Hassan, Mohd Khair, Liu, Yunyun, Onwudinjo, Erasmus Cufe Ujunwa

    Published 2022
    “…However, in the Fuzzy-PID controller, the fuzzy logic algorithm is used to auto-tune the PID controller, but it cannot be considered as a fully real-time controller since the fuzzy algorithm uses a previous knowledge base built offline. …”
    Get full text
    Get full text
    Article
  17. 17

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…AI in KMS is used in the knowledge creation process. The Bert2Bert model is used in the multi-document summarisation of Indonesian-language knowledge in the knowledge combination process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Knowledge Discovery Of Noise Level In Lecture Rooms by Tang, Jau Hoong

    Published 2018
    “…The classroom acoustics is an important aspect of the lecturing and learning condition in university level to ensure the student able to receive the information and knowledge from the lecturer. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…Therefore, it is important to have a second level security to the user's password. Cryptography is an art to convert a message into other forms by using some algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20