Search Results - (( recognition application testing algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Real-time vision-based Malaysian road sign recognition using an artificial neural network / Kh Tohidul Islam by Kh Tohidul , Islam

    Published 2017
    “…The system is based on two stages, one performs the detection and another one is for recognition. In the first stage, a hybrid color segmentation algorithm has been developed and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Handwritten digits recognition based on improved label propagation algorith by Jie, M., Aziz, I.A., Hasbullah, H., Azizan, S.A.B.

    Published 2016
    “…Handwritten digits recognition is a practical problem in pattern recognition applications, is of academic and commercial interest. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…This thesis proposes new algorithms based on Artificial Immune Recognition System to address the mentioned weaknesses and improve the performance of the Artificial Immune Recognition System. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…In this paper, we propose a road sign detection and recognition algorithm for an embedded application. The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali by Mohd Ali, Muhammad Afiq

    Published 2025
    “…The study focuses on designing a Hand Gesture Recognition application by means of the YOLOv8 deep learning algorithm to recognize hand gestures associated with autism spectrum disorder (ASD). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Besides that, fingerprint recognition beyond criminal identification applications to several civilian applications such as access control, time and attendance, and computer user login. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20

    Optical character recognition for Quranic image similarity matching by Alotaibi, Faiz, Abdullah, Muhamad Taufik, Abdullah, Rusli, O. K. Rahmat, Rahmita Wirza, Hashem, Ibrahim Abaker Targio, Sangaiah, Arun Kumar

    Published 2017
    “…The obtained accuracy was superior to the other tested K-nearest neighbor (knn) algorithm and published results in the literature. …”
    Get full text
    Get full text
    Get full text
    Article