Search Results - (( java segmentation using algorithm ) OR ( pattern interaction effect algorithm ))
Search alternatives:
- pattern interaction »
- java segmentation »
- effect algorithm »
- using algorithm »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…Finally, the algorithm found, which would solve the image segmentation problem.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Prime-based method for interactive mining of frequent patterns
Published 2010“…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
4
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Although effective, the performance of the k-means clustering algorithm depends heavily on the initial centroids and the number of clusters, k. …”
Get full text
Get full text
Article -
6
Quasi linear algorithm for modelling shoreline change from AIRSAR/POLSAR polarized data
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
Simulation model algorithm for pre-hospital emergency care (PHEC) volunteers in Indonesia
Published 2018“…Algorithm models for PHEC simulation have some strengths in real setting and effective interactive learning to evaluate the capabilities of first responders in managing pre-hospital emergency, and improve problem-solving skills, as well as their performance in such aspects as skill, knowledge, and attitude.…”
Get full text
Get full text
Get full text
Article -
8
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Although effective, the performance of the k-means clustering algorithm depends heavily on the initial centroids and the number of clusters, k. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. …”
Get full text
Get full text
Final Year Project -
10
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
11
Genetic ensemble biased ARTMAP method of ECG-Based emotion classification
Published 2012Get full text
Get full text
Conference or Workshop Item -
12
Coherence Function of Wind and Waves ofMetocean Data
Published 2011“…It is estimated up to 30% only while other factors that contribute to generate wave are possibly the tidal effect, gravity pull or other parts of the sea. The coherency differs for platform at different operation field region, as well as for seasonal pattern. …”
Get full text
Get full text
Final Year Project -
13
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Businesses have adopted certain algorithms that can help them to extract information from the Internet to discover potentially significant patterns inherent in the database, which can help the online marketing strategy. …”
Get full text
Get full text
Conference or Workshop Item -
14
Comparative analysis of line search methods in the Steepest Descent algorithm for unconstrained optimization problems / Ahmad Zikri Shukeri, Puteri Qurratu Ain Megat Sulzamzamendi...
Published 2024“…In summary, this study transcends the scope of mere modification to delve into a thorough comparative analysis, providing insights into the complicated interaction of line search techniques inside the SD algorithm for unconstrained optimization problems. …”
Get full text
Get full text
Student Project -
15
EMG signal classification for human computer interaction: a review
Published 2009“…HCI determines the effective utilization of the available information flow of the computing, communication, and display technologies. …”
Get full text
Get full text
Get full text
Article -
16
Travel Booking Analysis and Prediction for NZ Malaya using predictive analytics
Published 2025“…For the three prediction experiments on trip package selection, marketing effectiveness, and sales forecasting three ML algorithms were applied: Decision Tree, Random Forest, and Naive Bayes. …”
Get full text
Get full text
Student Project -
17
Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research
Published 2013“…This simulator can simulate or generate seizure, pre-seizure and normal EEG waveform. The paired cost effective Arduino microcontroller (in case of wireless system) will be having the algorithm in built in order to classify the type of signal received. …”
Get full text
Get full text
Get full text
Non-Citation Index Journal -
18
A robust, scalable multi-robot control and coordination framework achieving high throughput for parcel sorting centers
Published 2025“…The research demonstrates significant improvements in system throughput, with pattern-matching allocators outperforming native allocators by up to 23.52%. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A practical and interactive web-based software for online Qur’anic Arabic learning
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis
