Search Results - (( pattern visualization means algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC by Jamil, Nur Farahim

    Published 2014
    “…The algorithm gives a mean accuracy of 84% out of 125 test images.…”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…In summary, vascular pattern can be detected visually from the palm image acquired by the NIR palm image acquisition device developed in this research.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…Therefore, a corresponding fringe analysis algorithm was developed for De Bruijn colour-coded fringe pattern to circumvent the conventional phase unwrapping techniques which are unreliable and time-consuming. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Identification of plant diseases is key to avoiding losses in agricultural yields and product quantities. Plant disease study means the study of disease patterns that can be visually seen on plants. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes by Shariah, Sawsan Kamel

    Published 2012
    “…The removing method was based on the filtration process applied on the divided image blocks in the spatio-temporal depth technique controlled by an automatic steerable on noise availability in the image. The filter algorithm is based on an enhanced harmonic mean filter algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Dynamic Mapping and Visualizing Dengue Incidences in Malaysia Using Machine Learning Techniques by Mathur, N., Asirvadam, V.S., Dass, S.C., Gill, B.S.

    Published 2021
    “…This research focuses on unsupervised learning techniques to predict the density of cases. K-mean, KNN, and Expectation-Maximization (EM) algorithms are used to cluster the cases and visualize the pattern of dengue spread. …”
    Get full text
    Get full text
    Article
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia by San, Limhwee

    Published 2006
    “…The maps were geometrically corrected and colour coded for visual interpretation to the PM10 and AOT distributions patterns. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…This paper presents an unsupervised network-based anomaly detection framework that integrates deep autoencoders with the Isolation Forest algorithm. The framework analyzes extracted traffic features, including packet length and IP address patterns, to detect deviations from normal behaviour without requiring labelled data. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Mathematical modelling of covid-19 transmission and vaccine effectiveness for a university by Shahirah Atikah, Mohamad Husnin

    Published 2024
    “…The models were numerically solved using the Runge Kutta fourth order method (RK4) and parameter fitting techniques namely Pattern Search and Nelder-Mead Simplex algorithm embedded in MATLAB software. …”
    Get full text
    Get full text
    Thesis
  19. 19

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids by Ahmad Zaidi Tani

    Published 2015
    “…Among these 13 E. lanceolatus and E. fuscoguttatus ncni-ANM loci ranged in size from 153 to 177 bp and 157 to 624 bp respectively revealing variation across all OTUs through visualization of agarose gel electrophoresis patterns and binary matrix scoring. …”
    Get full text
    Get full text
    Get full text
    Thesis