Search Results - (( java segmentation using algorithm ) OR ( knowledge visualization detection algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…The above mentioned problems are the motivation of this research; where it is vital to propose a security alert framework using dynamic tweet-based features for phishing detection on Twitter. This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…Practically, this study contributes to topic modelling and concept coherence for the purpose of visualizing information, knowledge sharing and optimized decision making.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20