Search Results - (( shape classification rules algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Direct least squares fitting of ellipses segmentation and prioritized rules classification for curve-shaped chart patterns by Lei, I. L., Teh, Phoey Lee *, Si, Yain-Whar

    Published 2021
    “…To further enhance the efficiency of classifying chart patterns from real-time streaming data, we propose a novel algorithm called Accelerating Classification with Prioritized Rules (ACPR). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad by Ahmad, Khairul Adilah

    Published 2018
    “…This learning algorithm represents an automatic generation of membership functions and rules from the data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application Of Neural Network In Malaria Parasites Classification by Lim, Chia Li

    Published 2006
    “…Multilayer Perceptron (MLP) network and Radial Basis Function (RBF) network will be developed using MATLAB in which MLP network is trained with Back Propagation, Bayesian Rule and Levenberg-Marquardt learning algorithm and RBF network is trained with k-means clustering algorithm. …”
    Get full text
    Get full text
    Monograph
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications by Lim , Chee Peng

    Published 2016
    “…Further work will focus on ascertaining the stability of the FAM network in defect classification, as well as on improving the overall performance of the defect detection algorithms developed in this project. …”
    Get full text
    Monograph
  6. 6

    Behavior Recognition In Video Surveillance System For Indoor Public Areas Using Artificial Immune System by Abad, Azad

    Published 2008
    “…Also, the robust algorithm with hands of artificial immune system rules like binary hamming shape-space and advance detector structure with fast decision making to detect three abnormal behaviors such as entering the forbidden area, standing more than threshold and running was implemented The result obtained showed the improvement in the duration for each phase when compared with previous methods in image segmentation like mixture of Gaussian and behavior recognition like and/Or tree or neural networks.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering by Rashed, Alwatben Batoul

    Published 2022
    “…Among multi-objective evolutionary algorithms proposed in the literature, particle swarm optimization (PSO)-based multi-objective (MOPSO) algorithm has been cited to be the most representative. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Generating type 2 trapezoidal fuzzy membership function using genetic tuning by Khairuddin, S.H., Hasan, M.H., Akhir, E.A.P., Hashmani, M.A.

    Published 2022
    “…There are several types of inputMFs which can be introduced in FIS, commonly chosen based on the type of real data, sensitivity of certain rule implied and computational limits. This paper focuses on the construction of interval type 2 (IT2) trapezoidal shape MF from fuzzy C Means (FCM) that is used for fuzzification process of mamdani FIS. …”
    Get full text
    Get full text
    Article
  10. 10

    Generating type 2 trapezoidal fuzzy membership function using genetic tuning by Khairuddin, S.H., Hasan, M.H., Akhir, E.A.P., Hashmani, M.A.

    Published 2022
    “…There are several types of inputMFs which can be introduced in FIS, commonly chosen based on the type of real data, sensitivity of certain rule implied and computational limits. This paper focuses on the construction of interval type 2 (IT2) trapezoidal shape MF from fuzzy C Means (FCM) that is used for fuzzification process of mamdani FIS. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Real-time oil palm fruit bunch ripeness grading system using image processing techniques by Alfatni, Meftah Salem M.

    Published 2013
    “…Image processing approaches, such as acquisition, pre-processing, segmentation,feature extraction, and classification as well as expert rule-based system, were developed to automate the ripeness grading for oil palm fruit bunches. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19
  20. 20