Search Results - (( leave application during algorithm ) OR ( variable extracting window algorithm ))
Search alternatives:
- variable extracting »
- application during »
- leave application »
- during algorithm »
- window algorithm »
-
1
The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact
Published 2011“…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
Get full text
Get full text
Article -
2
Design of intelligent Qira’at identification algorithm
Published 2017“…The process of the SPAP Algorithm is to extend parameters of the Affine Projection Block with two different selections of windowing length that affect the final accuracy on pattern classification. …”
Get full text
Get full text
Thesis -
3
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…In order to achieve the aim, several objective must be carried out which are including the classification process in order to identify urban area in Penang Island in both image. Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. …”
Get full text
Get full text
Thesis -
4
Predicting the optimum compositions of a transdermal nanoemulsion system containing an extract of Clinacanthus nutans leaves (L.) for skin antiaging by artificial neural network mo...
Published 2017“…In vivo ultrasound attributes of the skin study showed that the collagen content increased significantly with the application of the C. nutans nanoemulsion among all 21 volunteers during the 21 days of the treatment period. …”
Get full text
Get full text
Get full text
Article -
5
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This application also tracks the entrance and leave time of the visitors. …”
Get full text
Get full text
Get full text
Proceeding -
6
Advanced Encryption Standard Mobile Application to Improve College Entrance Security in UNIMAS
Published 2022“…This application also tracks the entrance and leave time of the visitors. …”
Get full text
Get full text
Get full text
Article -
7
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…The Internet is one of the fastest growing areas of intelligence gathering. During their navigation Web users leave many records of their activity. …”
Get full text
Get full text
Article -
8
Modeling forest fires risk using spatial decision tree
Published 2011Get full text
Get full text
Conference or Workshop Item -
9
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…A multi-date post-classification comparison algorithm was used to determine LULC changes in two intervals, 1986-1990, and 1990-2000. …”
Get full text
Get full text
Thesis -
10
Cornsense: leaf disease detection application / Iffah Fatinah Mohamad Nasir
Published 2025“…The purpose of this project is to develop a mobile application for corn leaf disease detection leveraging the YOLOv8 (You Only Look Once version 8) object detection algorithm. …”
Get full text
Get full text
Thesis -
11
Optimization of Microbial Electrolysis Cell for Sago Mill Wastewater Derived Biohydrogen via Modeling and Artificial Neural Network
Published 2023“…The model reliability describes the second sub-objective, which is to determine the feasible operating window of the MEC using multiple-objective optimization based on the nonlinear convex method using gradient descent algorithm as the objective function in maximizing the percentage efficiency of the MEC after validating the mathematical model. …”
Get full text
Get full text
Get full text
Thesis -
12
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
13
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
17
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis -
18
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis
