Search Results - (( knowledge visualization implementation algorithm ) OR ( java automatic detection algorithm ))
Search alternatives:
- visualization implementation »
- implementation algorithm »
- knowledge visualization »
- java »
-
1
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017“…In this paper, we introduce a mobile based computer vision algorithm for automatic bacteria colony counting using morphological operations and transforms in image processing, on a custom Android mobile cross-platform open source software and written in Java, C++ and Open CV computer vision library. …”
Get full text
Get full text
Get full text
Article -
2
Automatic generation of content security policy to mitigate cross site scripting
Published 2016Get full text
Get full text
Conference or Workshop Item -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
High performance visualization of human tumor growth software
Published 2008“…The result of finite difference approximation (explicit, Crank-Nicolson and fully implicit methods) will be presented graphically. The implementation of parallel algorithm based on parallel computing system is used to visualize the growth of human tumour. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
Get full text
Get full text
Thesis -
9
Fuzzy logic controller for an automatic car gearbox shifting
Published 2009“…The Fuzzy Logic components that were implemented included the fuzzification, knowledge base, inference engines and defuzzification. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking
Published 2017“…Until now, there are still no perfect algorithm to track the target flawlessly. In order to improve the performance, the main idea proposed is implementing optimization technique on the selected parameters and obtain a better performance. …”
Get full text
Get full text
Monograph -
11
Sentiment analysis of customer review for Tina Arena Beauty
Published 2025“…Future work may involve expanding the dataset, integrating real-time feedback systems, and evaluating advanced algorithms to improve classification performance further. …”
Get full text
Get full text
Student Project -
12
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…This semantic technology is chosen due to the ability to mine, interpret and organise the knowledge. Ontology can be seen as a knowledge base that can be used to improve the image retrieval process with the aim of reducing the semantic gap between visual features and high-level semantics. …”
Get full text
Get full text
Thesis -
13
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis -
14
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…This research is proving the power of combination of discrete and continuous wavelet transform for achieving high accuracy in single trial detection and visualization of P300. Meanwhile the new approaches in channels selection methods help the algorithms for convenient online usage.…”
Get full text
Get full text
Thesis -
15
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
16
Review on computational strategies for bi-layered metal powder compaction
Published 2024“…A scrutinize part is the implementation of algorithm to describe powder behavior under double loading as well as to relate with other mechanical variables that eventually require expertise on computational plasticity knowledges involving horizontal contacts. …”
Get full text
Get full text
Get full text
Book Section -
17
-
18
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Fuzzy-Rough Nearest Neighbours (FRNN) technique is an outstanding technique to model uncertainty under an imperfect data condition. The current implementation of FRNN technique is not designed for incremental learning problem because there is no update function to incrementally reshape and reform the existing knowledge granules. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
20
Computed tomography and echocardiography image fusion technique for cardiac images
Published 2016“…Also, different performance metrics are implemented to examine the performance of the proposed fusion system. …”
Get full text
Get full text
Get full text
Thesis
