Search Results - (( does relationship between algorithm ) OR ( based information based algorithm ))*
Search alternatives:
- does relationship »
- between algorithm »
- based information »
- information based »
-
1
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
2
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
Get full text
Get full text
Thesis -
3
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000“…This research presents a reverse engineering tool VOO++ that will read an Object- Oriented C++ source code using UML notation in order to visualise its Class structure and the various relationships that may exist including, inheritance, aggregation, and dependency relationships based on the modified Cohen-Sutherland clipping algorithm. …”
Get full text
Get full text
Thesis -
4
Bayesian Network of Traffic Accidents in Malaysia
Published 2019“…By using Hill Climb (HC) and Tabu algorithms, the structure of the data was learnt and their relationship is estimated through the conditional probability based on the Bayes theorem. …”
Get full text
Get full text
Article -
5
Enhanced Image Classification for Defect Detection on Solar Photovoltaic Modules
Published 2023“…The accuracy value shows that the KNN algorithm is better when compared to the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Adaptive abdominal fat and liver segmentation of ct scan images for abdominal fat-fatty liver correlation
Published 2012“…The whole liver segmentation procedure is based on processing the CT slices one by one. Gray level, Gaussian gradient, region growing algorithm,distance transformation, canny edge detector and anatomic information are employed together to segment the liver in each CT slice. …”
Get full text
Get full text
Thesis -
7
Calibrating hand gesture recognition for stroke Rehabilitation Internet-of-Things (RIOT) using MediaPipe in smart healthcare systems
Published 2024“…The Design of Experiment (DoE) methodology allows physiotherapists and researchers to systematically explore the relationship between RIOT and accurate hand gesture recognition using Python's MediaPipe library, by addressing possible factors that may affect the reliability of patients’ scoring results while emphasising data security consideration. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A review on the graphical user authentication algorithm : recognition-based and recall-based.
Published 2013“…User authentication has become an important consideration in information security as traditional password-based schemes are constantly subjected to attacks. …”
Get full text
Get full text
Article -
9
-
10
An indoor based push notification for location-based marketing using bluetooth smart ready technology / Nur Farehah Alias
Published 2017“…Therefore, this project has proposed a method called token based alert notification. There are three algorithm developed for token based alert notification which is tokenization algorithm, token matching algorithm and item identification algorithm. …”
Get full text
Get full text
Thesis -
11
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
12
MGR: An Information Theory Based Hierarchical Divisive Clustering Algorithm for Categorical Data
Published 2014“…This research proposes mean gain ratio (MGR), a new information theory based hierarchical divisive clustering algorithm for categorical data. …”
Get full text
Get full text
Get full text
Article -
13
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014“…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
Get full text
Get full text
Thesis -
14
Adaptive intelligence job online scheduling within dynamic grid environment based on gridsim
Published 2008“…Additionally, the provided common information from Grid Information Service (GIS) and an arrival new job are calculated by Fuzzy C-Means (FCM) algorithm in order· to evaluate the current status of resources and groups of arrival jobs. …”
Get full text
Get full text
Article -
15
-
16
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
Get full text
Get full text
Get full text
Article -
17
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. …”
Get full text
Get full text
Get full text
Thesis -
18
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
19
Algorithms for extracting adjacency matrix based on Formal Concept Analysis (FCA)
Published 2017“…The desire to achieve a holistic representation of Information Retrieval (IR) with the aim for a human-oriented form of representation has spurred the growth of concept-based IR search techniques such as the Semantic Web technology. …”
Get full text
Get full text
Conference or Workshop Item -
20
Channel quality information (CQI) reporting algorithms in LTE-A
Published 2016“…The simulation results show that the average CQI reporting algorithm produced more compromising results than the automated CQI reporting algorithm and the average RB-based CQI reporting algorithm…”
Get full text
Get full text
Get full text
Get full text
Article
