Search Results - (( recognition application a algorithm ) OR ( java implementation tree algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article
  6. 6

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Handwritten digits recognition based on improved label propagation algorith by Jie, M., Aziz, I.A., Hasbullah, H., Azizan, S.A.B.

    Published 2016
    “…Handwritten digits recognition is a practical problem in pattern recognition applications, is of academic and commercial interest. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri by Milad , Miri

    Published 2018
    “…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…Face recognition involves the comparison of a given face with other faces in a database. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition by M. A., Ameedeen, Marhaini, M. S.

    Published 2016
    “…While the algorithm helped to classify different types of wavelengths produced from the sensor, a classification-based algorithm via Pattern Recognition Method will be used to classify and match the food components. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition by Othman, Mahmod, Syed Abdullah, Sharifah Lailee, Ahmad, Khairul Adilah, Abu Bakar, Mohd Nazari, Mansor, Ab Razak

    Published 2016
    “…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The detection, recognition and conversion of the characters in an image into a text are called optical character recognition (OCR). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…The recognition of dialogue act is a task of crucial importance for the processing of natural language in many applications such as dialogue system. …”
    Get full text
    Get full text
    Thesis