Search Results - (( pattern extraction utilizing algorithm ) OR ( java application clustering algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…An algorithm called Flex (Frequent lexicographic patterns) has been proposed in obtaining a good performance of searching li-equent patterns. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…Data mining can discover patterns or rules from a vast volume of data. This patterns or rules may help to develop better decision-making process. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Songket pattern classification using backpropagation neural network / Nik Aidil Syawalni Nik Mazlan by Nik Mazlan, Nik Aidil Syawalni

    Published 2024
    “…The methodology adopted in this study encompasses the assembly of a dataset images of Songket patterns. The process included data pre-processing and feature extraction. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification by Mohamed Ali, Mohamed Hassan

    Published 2017
    “…The proposed algorithm extracted the local feature information of the finger vein pattern (patches), and used these patches to improve the robustness of the identification. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN by SARI, YUNITA SARI

    Published 2011
    “…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13
  14. 14

    Herbs recognition based on chemical properties using machine learning algorithm by Mohamad Radzi, Nur Fadzilah, Che Soh, Azura, Ishak, Asnor Juraiza, Hassan, Mohd Khair

    Published 2023
    “…This method employs a reweighting technique that utilizes the peak area and peak height of VOCs to generate a unique pattern for each herb species. …”
    Get full text
    Get full text
    Article
  15. 15

    Image Stitching Of Aerial Footage by Ng, Wei Haen

    Published 2021
    “…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    EMG motion pattern classification through design and optimization of neural network by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2012
    “…A back-propagation neural network with Levenberg-Marquardt training algorithm has been utilized for the classification of EMG signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…By leveraging image processing techniques, statistical analysis and machine learning algorithms, Python enables the extraction of relevant features and patterns from data. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
    Get full text
    Get full text
    Article