Search Results - (( developing building detection algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Building detection using object-based Image analysis (OBIA) and machine learning (ML) algorithms / Hanani Mohd Shahar by Mohd Shahar, Hanani

    Published 2020
    “…The information of building features especially in the urban area is very important to support urban management and development. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…The key concern of this thesis is to determine the influence of flying height parameters on crack detection using UAVs. Looking at the current scenario of development and the age of the structures in urban areas, there is a high significance of efficient and accurate building inspection methods. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Detecting indoor positioning of moving object using wifi triangulation algorithm for kid tracker application by Wan Nor Afiqah, Wan Othman

    Published 2016
    “…The increasing number of missing kid from days to days is become main concern for parents. Hence, „Detecting Indoor Positioning of Moving Object using Wi-Fi Triangulation Algorithm for Kid Tracker Application‟ as a part of process in Kid Tracker Application to keep track our kids movement by focusing inside the building (shopping mall). …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…The objectives were: to develop the FD algorithm in GCPV system, to identify the types of fault occurrence in FD in GCPV system, and to verify the FD algorithm to be performed in Malaysian climate. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Motion detection and simulation study on human walking behavior by Loon, Cheong Wai

    Published 2012
    “…Two types of environments are developed in the simulation to study the human walking behaviour which are empty space and building simulation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new approach to highway lane detection by using hough transform technique by Aminuddin, Nur Shazwani, Mat Ibrahim, Masrullizam, Mohd Ali, Nursabillilah, Ahmad Radzi, Syafeeza, Mohd Saad, Wira Hidayat, Darsono, Abdul Majid

    Published 2017
    “…This paper presents the development of a road lane detection algorithm using image processing techniques.This algorithm is developed based on dynamic videos, which are recorded using on-board cameras installed in vehicles for Malaysian highway conditions.The recorded videos are dynamic scenes of the background and the foreground, in which the detection of the objects, presence on the road area such as vehicles and road signs are more challenging caused by interference from background elements such as buildings, trees, road dividers and other related elements or objects. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…Unmanned Aerial Vehicles (UAV) can automate, avoid visual inspection, and avoid other physical check-ups of these buildings. Automated crack detection using Machine Learning Algorithms (MLA), especially a Conventional Neural Network (CNN), along with an Unmanned Aerial Vehicle (UAV), can be effective and both can efficiently work together to detect the cracks in buildings using image processing techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Performance evaluation of intrusion detection system using selected features and machine learning classifiers by Raja Mahmood, Raja Azlina, Abdi, AmirHossien, Hussin, Masnida

    Published 2021
    “…Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. …”
    Get full text
    Get full text
    Article
  17. 17

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    SVM for network anomaly detection using ACO feature subset by Mehmood, T., Rais, H.B.M.

    Published 2016
    “…Intrusion detection systems are developed on the bases of two different detection techniques, signature-based technique and anomaly-based technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Building classification models from imbalanced fraud detection data / Terence Yong Koon Beh, Swee Chuan Tan and Hwee Theng Yeo by Terence, Yong Koon Beh, Swee, Chuan Tan, Hwee, Theng Yeo

    Published 2014
    “…This paper reports our experience in applying data balancing techniques to develop a classifier for an imbalanced real-world fraud detection data set. …”
    Get full text
    Get full text
    Get full text
    Article