Search Results - (( visualization implementing extraction algorithm ) OR ( java implementation from algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Neural Network Based Pattern Recognition in Visual Inspection System for Intergrated Circuit Mark Inspection by Sevamalai, Venantius Kumar

    Published 1998
    “…Error-back propagation algorithm was used to train the network. The objective was to test the robustness of the network in handling pattern variations as well as the feasibility of implementing it on the production floor in tetms of execution speed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Classification of herbs plant diseases via hierarchical dynamic artificial neural network by Abdullah, Lili Nurliyana, Khalid, Fatimah, Borhan, N.M.

    Published 2010
    “…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…With tests conducted on the implementation of the Fourier Transform as a method of fingerprint feature extraction, the use of the Fourier Transform was proven not to work. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Classification of herbs plant diseases via hierachical dynamic artificial neural network after image removal using kernel regression framework by Abdullah, Lili Nurliyana, Khalid, Fatimah, Borhan, N.M.

    Published 2011
    “…Once the image of a target is captured digitally, a myriad of image processing algorithms can be used to extract features from it. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Effective salience-based fusion model for image retrieval by Mansourian, Leila

    Published 2016
    “…After implementation, it was found that this method of feature extraction affects the accuracy of the results, which were more accurate than results obtained using seven other state-of-the-art models. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface by Ali, Mohammed A. H., Au, Kai Lun

    Published 2018
    “…The image processing algorithm has been developed to extract the main features of the tested objects such as defects, borders, and noise. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…This developed system can be used for any real-world online database. The system was implemented using Microsoft Visual C++ programming language and HTML. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Automated visual inspection (AVI) research for quality control in metal stamping manufacturing by Habibullah, Akbar, Anton Satria, Prabuwono

    Published 2008
    “…This paper is focusing to the algorithm aspects of the A VJ system. ft consists of digital image acquisition, noise reduction, edge detection, feature extraction and classification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis