Search Results - (( java segmentation using algorithm ) OR ( making process generating algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article by Abdol Azis, Hazriq Syahmie

    Published 2010
    “…Considering to fitness values sensitivity in genetic algorithm process, there is needed to apply load flow for decision-making. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme by Arif, Mandangan, Kamarulhaili, Hailiza, Asbullah, Muhammad Asyraf

    Published 2021
    “…Instead of depending solely on the orthogonality-defect values, the proposed conditions could make the measurement of good and bad bases in the key generation algorithm of the GGH-MKA cryptosystem becomes clearer and deterministic.…”
    Get full text
    Get full text
    Article
  7. 7

    Incorporating energy generation process in environmental assessment of a biopharmaceutical process by Auni Hamimi, Idris

    Published 2015
    “…Therefore, this work aims to estimate the PET value from WFT and pure steam generation using a simple algorithm which is modified from Waste Reduction (WAR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  9. 9

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    HYBRID: an efficient unifying process to mine frequent itemsets by Zulkurnain, Nurul Fariza, Shah, Ahmad

    Published 2018
    “…In this paper, an efficient hybrid algorithm was designed using a unifying process of the algorithms Improved Apriori and FP-Growth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Optimization of multi-holes drilling path using particle swarm optimization by Najwa Wahida, Zainal Abidin

    Published 2022
    “…The performance of PSO was then compared with other meta-heuristic algorithms, including Genetic Algorithm (GA) and Ant Colony Optimisation (ACO), Whale Optimisation Algorithm (WOA), Ant Lion Optimiser (ALO), Dragonfly Algorithm (DA), Grasshopper Optimisation Algorithm (GOA), Moth Flame Optimisation (MFO) and Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…These devices continuously generate a massive amount of data on the network. The IoT (mobile) devices that generate these data are limited in terms of processing capacity and energy, because of these limitations of the mobile devices, they cannot process all generated tasks in the IoT application environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme by Arif Mandangan, Kamarulhaili, H., Asbullah, M. A.

    Published 2021
    “…Instead of depending solely on the orthogonality-defect values, the proposed conditions could make the measurement of good and bad bases in the key generation algorithm of the GGH-MKA cryptosystem becomes clearer and deterministic.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, Khan

    Published 2011
    “…decision making. Timely identification of newly emerging trends is needed in business process. …”
    Get full text
    Get full text
    Citation Index Journal
  16. 16

    MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM by Aurangzeb, khan, Baharum, Baharudin, Khairullah, khan

    Published 2011
    “…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
    Get full text
    Get full text
    Citation Index Journal
  17. 17

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A semi-apriori algorithm for discovering the frequent itemsets by Fageeri, S.O., Ahmad, R., Baharudin, B.B.

    Published 2014
    “…Mining the frequent itemsets are still one of the data mining research challenges. Frequent itemsets generation produce extremely large numbers of generated itemsets that make the algorithms inefficient. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Combinatorial test suites generation strategy utilizing the whale optimization algorithm by Ali Abdullah, Hassan, Salwani, Abdullah, Kamal Zuhairi, Zamli, Rozilawati, Razali

    Published 2020
    “…Supporting the No Free Lunch theorem, as well as potentially offering new insights into the whole process of t-way generation, this article proposes a new strategy with constraint support based on the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Hybrid artificial immune system-genetic algorithm optimization based on mathematical test functions by Ali M.O., Koh S.P., Chong K.H., Yap D.F.W.

    Published 2023
    “…The hybrid includes two processes; firstly, AIS is the attraction among the researchers as the algorithm. …”
    Conference paper