Search Results - (( developing computer detection algorithm ) OR ( java applications optimisation algorithm ))
Search alternatives:
- applications optimisation »
- optimisation algorithm »
- developing computer »
- java applications »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Computer aided detection Computer aided detection (CAD) is a tool developed to assist radiologist interpretations from diagnostic modalities to decrease observational oversights or false negative rates. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition
Published 2017“…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
-
8
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
9
-
10
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
11
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
12
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…It also caused many protections are developed to fight the malware. The most common method of detecting malware relies on signature-based detection. …”
Get full text
Get full text
Thesis -
13
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis -
14
A comparative study of pitch detection algorithms for microcontroller based voice pitch detector
Published 2017“…This paper presents a study to compare the performance of two pitch detection algorithms namely the Autocorrelation Function and the Cepstrum Analysis to select a suitable algorithm that can be developed into a standalone voice pitch detector. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
-
18
Bot detection using machine learning algorithms on social media platforms
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
19
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020Get full text
Get full text
Get full text
Article -
20
Shot boundary detection based on orthogonal polynomial
Published 2019“…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
Get full text
Get full text
Get full text
Article
