Search Results - (( java segmentation using algorithm ) OR ( pattern execution between algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Machine learning predictions of stock market pattern using Econophysics approach by Roslan, Nur Nadia Hani, Abdullah, Shahino Mah

    Published 2025
    “…Hence, this research will be using Monte Carlo Simulation and identify which machine learning algorithm is suitable for predicting stock market patterns. …”
    Get full text
    Get full text
    Book Section
  6. 6

    Survival versus non-survival prediction after acute coronary syndrome in Malaysian population using machine learning technique / Nanyonga Aziida by Nanyonga , Aziida

    Published 2019
    “…Self-Organizing Feature (SOM) was used to visualize and identify the relationship and pattern between factors affecting mortality after ACS. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES by MD HASIM, SITI MASTURA

    Published 2013
    “…Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    A filtering algorithm for efficient retrieving of DNA sequence by Abdul Rahman, Mohd Nordin, Mohd. Saman, Md. Yazid, Ahmad, Aziz, Md. Tap, Abu Osman

    Published 2009
    “…Similarity search procedure is executed by an alignment process between query and targeted sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication by JAM'AAH, SUUD

    Published 2021
    “…In this model, eight different LU and QR encoding method variants are evaluated in terms of execution time, the number of nonzero, and the pattern of nonzero. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique by Nahla Mohammedelzein, Elawad Babiker

    Published 2021
    “…The result revealed that there is a strong correlation between execution time and throughput with a strength of 99.9% percent as confirmed by the Pearson correlation coefficient. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Topology-aware hypergraph based approach to optimize scheduling of parallel applications onto distributed parallel architectures by Koohi, Sina Zangbari

    Published 2020
    “…HPAs use parallel processors and assist in parallel execution of tasks with complex interdependency between data and operations. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sales prediction for Adha Station by using predictive analytics by Mohd Mokhid, Muhammad Amier Latieff

    Published 2025
    “…This research presented a technique for projecting sales utilising current data through a machine learning algorithm. The CRISP-DM approach was employed to execute the project across the phases of business understanding, data preparation, modelling, assessment, and deployment. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Sustainable green energy management : Optimizing scheduling of multi-energy systems considered energy cost and emission using attractive repulsive shuffled frog-leaping by Kadirgama, Kumaran, Awad, Omar I., Mohammed, M.N, Tao, Hai, Bash, Ali A. H. Karah

    Published 2023
    “…The ARSFL algorithm demonstrates superior performance in managing and minimizing energy purchase uncertainty compared to the particle swarm optimization (PSO) and genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A framework for classification software security using common vulnerabilities and exposures by Hassan, Nor Hafeizah

    Published 2018
    “…The main research aim is to investigate what information is necessary to make a formal vulnerability pattern representation.This is done through the usage of formal Backus-Naur-Form syntax for the execution and presented with newly created vulnerability flow diagram.Some future works were also proposed to further enhance the elements in the secured soft-ware process framework.This thesis focuses on the research and development of the design, formalization and translation of the vulnerability classification pattern through a framework using common vulnerabilities and exposures data.To achieve this aim, the following work was carried out.First step is to create and conceptualized necessary meta-process.Second step is to specify the relationship between the classifiers and vulnerability classification pat-terns. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Composing multi-relations association rules from crowdsourcing remuneration data by Siti Salwa Salleh, Nurhayati Zakaria, Norjansalika Janom, Syaripah Ruzaini Syed Aris, Noor Habibah Arshad

    Published 2022
    “…The data comprise a lot of redundancies, therefore an apriori algorithm is used to normalise it by removing redundancies and then extracting significant patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    STRATEGIC PROFILING & ANALYTIC MODELLING OF NODE MISBEHAVIOR IN MANET BASED IOT PARADIGM THEORY by Olanrewaju, Rashidah Funke, Najeeb, Athaur Rahman

    Published 2018
    “…In MANETs, security forms a prominent concern as it includes nodes which are usually portable and require significant coordination between them. Further, the absence of physical organisation makes such networks susceptible to security breaches, hindering secure routing and execution among nodes. …”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    Classification Of Gender Using Global Level Features In Fingerprint For Malaysian Population by Abdullah, Siti Fairuz

    Published 2016
    “…This proposed method can automatically execute the ridge calculation process from the 25mm2 fingerprint and enhance the forensic gender classification process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis