Search Results - (( visualization application need algorithm ) OR ( java implementation phase algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Enhanced 3D terrain visualization process using game engine by Mohd Hafiz, Mahayudin

    Published 2018
    “…Furthermore, operating system resource needs to be used before it goes online. The main finding of this study is the new algorithm of enhancing 3D terrain visualization process using Unity3D game engine. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Kernerlized Correlation Filters Parameters Optimization For Enhanced Visual Tracking by Ong, Chor Keat

    Published 2017
    “…Visual tracking has become one of the most important components in computer vision as the knowledge in this field can be applied into a wide range of applications in computer vision such as medical imaging, pattern recognition, video surveillance, industrial robot, computer-human interaction, etc. …”
    Get full text
    Get full text
    Monograph
  14. 14

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…Thus, to make Vitiligo analysis system available to unspecialized users, the android based system using smartphone is envisaged. The algorithm therefore needs to be rewritten for smartphone. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Natural image noise level estimation based on local statistics for blind noise reduction by Khmag, Asem, Ramli, Abd Rahman, Sy Mohamed, Sy Abd Rahman Al-haddad, Kamarudin, Noraziahtulhidayu

    Published 2018
    “…For blind denoising applications, the proposed denoising algorithm integrates the undecimated wavelet-based denoising algorithms and PCA to develop the subjective and objective qualities of the observed image, which result from filtering processes. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    A pilot study on the validation of vis-screen mobile application for vision test by Abdul Mutalib, Othman, Nyi Nyi, Naing, Atif Amin, Baig

    Published 2020
    “…We are developing this application based on the need for early detection to avoid further vision loss. …”
    Get full text
    Get full text
    Article
  19. 19

    K-means clustering and visualizing of significant words prototype for crowdsourced relationship comments / Muhammad Syafiq Mastor by Mastor, Muhammad Syafiq

    Published 2015
    “…The comments are clustered using K-Means algorithm and visualized using scatter plot. Each plot represents a comment where each comment are coloured according to their cluster and significant words. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive algorithms for automated intruder detection in surveillance networks by Ahmed, Tarem, Pathan, Al-Sakib Khan, Ahmed, Supriyo

    Published 2014
    “…Most of the schemes require custom equipment, or involve significant complexity and storage needs. After studying the area in detail, this work presents four novel algorithms to perform automated, real-time intruder detection in surveillance networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper