Search Results - (( software visualization matching algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- visualization matching »
- data normalization »
- java »
-
1
Pattern matching algorithm for artificial to natural DNA codes of a dementia brain
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
2
Parse tree visualization for Malay sentence (BMTutor)
Published 2015“…It is also to enhance the learning process in BM that can be used by communities, especially students. An algorithm in designing BMTutor is discussed in this paper.The algorithm of the software is done sequentially as followed: 1) tokenizing 2) checking the number of words, 3) searching and comparing process to check the spelling or conjunctions, 4) assigning each word with a certain word class, 5) matching with rules, and 6) delivering/producing output (sentence correction or parse tree visualization, word attribute components, and parse tree from sentence examples).Based on the testing conducted, output from the development process shows that the prototype can correct all 15 invalid sentences and can produce parse tree visualization for all 20 sentences.…”
Get full text
Get full text
Get full text
Article -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
4
Preserving the topology of self-organizing maps for data analysis: A review
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The Development of Color Based Visual Search Utility
Published 2001“…Finally, a binary search algorithm was used to match and display images requested. …”
Get full text
Get full text
Thesis -
6
Examination timetable scheduling system (ETSS) / Fong Teng Heng
Published 2000Get full text
Get full text
Thesis -
7
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
8
Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection
Published 1998“…Industrial visual machine inspection system uses template or feature matching methods to locate or inspect parts or pattern on parts. …”
Get full text
Get full text
Thesis -
9
Face Detection System / Chan Beh Teng
Published 2004“…After that, the system will locate the frontal human face(s) within the skin regions, using template matching. The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
10
Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan
Published 2020“…Furthermore, we aim to visualize the information of home and business broadband in Malaysia. …”
Get full text
Get full text
Thesis -
11
Unapparent information revelation for counterterrorism: Visualizing associations using a hybrid graph-based approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Text to Image Generation Using Machine Learning
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
15
-
16
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…In this paper we present three software-based agents built using kernel machines to perform automated, real-time intruder detection in surveillance systems. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
-
19
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis
