Search Results - (( java segmentation using algorithm ) OR ( user validation using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…Finally, the algorithm found, which would solve the image segmentation problem.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  3. 3
  4. 4
  5. 5

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The correlation based model validity tests are used to validate the identified fuzzy model.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Job position prediction based on skills and experience using machine learning algorithm / Ezaryf Hamdan by Hamdan, Ezaryf

    Published 2024
    “…Cross-validation techniques are employed to validate the model's performance and ensure robustness. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Outdoor User Location over 802.11 Ad-hoc Network by Roslan, Mohd Azrik

    Published 2006
    “…At the end of this work, the site testing has validated that this algorithm can be used to determine the user location in outdoor environment with considerable accuracy.…”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Automatic generation of user-defined test algorithm description file for memory BIST implementation by Hussin, Razaidi, Jidin, Aiman Zakwan, Loh, Wan Ying, Mispan, Mohd Syafiq, Lee, Weng Fook

    Published 2022
    “…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…This shows that search engine will rank pages using general user's interest, and neglect the aspect of personalization involving user's interest. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Influence maximisation towards target users on social networks for information diffusion by Temitope, Olanrewaju Abdus-Samad, Ahmad, Rahayu, Mahmuddin, Massudi

    Published 2018
    “…Influence maximisation has been an area of active research in recent years.This study aims to extend the fundamental influence maximisation problem (IMP) with respect to a set of target users on a social network.It is important to aim at the target users to speed up the rate of information diffusion and reduce the information diffusion cost.In doing so, the MITU algorithm was formulated and compared with state of the art algorithms.Publicly available datasets were used in validating the proposed algorithm.It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%.The influence overlap problem was equally identified in the heuristic algorithm where the seed set size was reduced by an average of six times.Furthermore, the random influencer selection identifies target nodes better than the betweenness and PageRank centralities.The findings could help organisations to reach target users on social media in the shortest cycle.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Influence maximization towards target users on social networks for information diffusion by Temitope, Olanrewaju Abdus-Samad, Ahmad, Rahayu, Mahmuddin, Massudi

    Published 2018
    “…Publicly available datasets were used in validating the proposed algorithm. It was found that the MITU identified all target nodes while significantly lowering the information diffusion cost function (IDCF) by up to 79%. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Proposal of meta-requirement approach to analyze requirements specification completeness by Muhamad Idaham, Umar Ong, M. A., Ameedeen

    Published 2018
    “…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Meta-requirement method towards analyzing completeness of requirements specification by Muhamad Idaham, Umar Ong, Mohamed Ariff, Ameedeen, Imran Edzereiq, Kamarudin

    Published 2018
    “…The objectives of this research are to identify the major factors in validating user requirements, development of a reverse engineered meta-requirement algorithm and validating with expert panel in requirements engineering of the algorithm usefulness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter