Search Results - (( virtual detection based algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- virtual detection »
- java application »
- detection based »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
3
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
4
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Modified canny edge detection technique for identifying endpoints
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Machine learning-based anomaly detection in NFV: a comprehensive survey
Published 2023“…The research evaluates the strengths and weaknesses of various machine learningbased algorithms for detecting network-based anomalies in NFV networks. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…This model can be implemented with Raspberry Pi to simulate the object detection algorithm virtually. During simulation, the object recognition algorithm is able to detect and classify various objects into its respective classes. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
9
-
10
-
11
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…This method is useful in other areas such as structure from motion reconstruction, object detection, tracking in robot vision and virtual reality. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Evaluation of the Transfer Learning Models in Wafer Defects Classification
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
18
An early warning detection system of terrorism in indonesia from Twitter contents using naïve bayes algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
Get full text
Get full text
Thesis -
20
Eye fixation versus pupil diameter as eye- tracking features for virtual reality emotion classification
Published 2022“…In this study, an empirical comparison of the accuracy of eye-tracking-based emotion recognition in a virtual reality (VR) environment using eye fixation versus pupil diameter as the classification feature is performed. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
