Search Results - (( basic detection based algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1
  2. 2

    Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng by Cheong, Dianne L.M., Sia Abdullah, Nur Atiqah

    Published 2006
    “…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…A user-friendly Graphical User Interface (GUI) is developed using Microsoft Visual Basic software to load and display the algorithm under test and display the result. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Ohka, Masahiro

    Published 2019
    “…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    The Role of Machine Learning and Deep Learning Approaches for the Detection of Skin Cancer by Tehseen Mazhar, Inayatul Haq, Allah Ditta, Syed Agha Hassnain Mohsan, Faisal Rehman, Imran Zafar, Jualang Azlan Gansau, Lucky Poh Wah Goh

    Published 2023
    “…The development of ML algorithms in dermatology has been supported lately regarding links to digital data processing (e.g., electronic medical records, Image Archives, omics), quicker computing and cheaper data storage. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Concentration and velocity measurement of flowing objects using optical and ultrasonic tomography by Saad, Mohd. Sazli

    Published 2007
    “…Prototype circuits have been implemented for optical and ultrasonic measurement system. Visual Basic 6.0 is used for software algorithms on concentration and velocity measurement. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Mean of correlation method for optimization of affective states detection in children by Rusli, Nazreen, Sidek, Shahrul Na'im, Md Yusuf, Hazlina, Ishak, Nor Izzati

    Published 2018
    “…This paper proposes an effective algorithm of texture analysis based on novel technique using Gray Level Co-occurrence Matrix approach to be applied so as to identify blood-flow region. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault by Wan Nor Shela Ezwane, Wan Jusoh

    Published 2014
    “…In order to ensure the iRTU system achieve its objectives, the methodology uses consists of OrCAD software to design and develop the iRTU circuit board, MPLAB software to program the microcontroller-base, Visual Basic software to create the GUI interfacing for the monitoring system and XBee as a communication media to connect iR TU to the control unit in short distances. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Budget visualizer using circle packing technique / Nursyahira Zulkeply by Zulkeply, Nursyahira

    Published 2019
    “…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…IC-MFD algorithms based hand-crafted features are the algorithms that detect the faked image depending on manual feature extraction while IC-MFD algorithms based machine-crafted features are the algorithms that detect the faked image automatically from image. …”
    Article
  19. 19

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…In the first phase, two algorithms were proposed. The first is enhanced thinning algorithm that is used to thin the sketch while maintaining its topology and basic shape. …”
    Get full text
    Get full text
    Monograph
  20. 20

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article