Search Results - (( rendering identification based algorithm ) OR ( java implementation phase algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Tumor Extraction for Brain Magnetic Resonance Imaging Using Modified Gaussian Distribution by Salih Al-Badri, Qussay Abbas

    Published 2006
    “…The visualization of the segmented structures uses a combination of volume rendering and surface rendering. The mutual information algorithms used in this work has been developed and experimented in the system and has proven to yield more accurate and stable results than other algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…The evergrowing volume of malware threats renders conventional signature-based methods insufficient in shielding against novel and intricate attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    Automated fault detection and extraction under gas chimneys using hybrid discontinuity attributes by Imran, Q.S., Siddiqui, N.A., Latiff, A.H.A., Bashir, Y., Khan, M., Qureshi, K., Al-Masgari, A.A.-S., Ahmed, N., Jamil, M.

    Published 2021
    “…3D-seismic data have increasingly shifted seismic interpretation work from a horizons-based to a volume-based focus over the past decade. …”
    Get full text
    Get full text
    Article