Search Results - (( developing emerging detection algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques by Mohammad Syawaludin Syafiq, Hassan

    Published 2016
    “…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Final output of the algorithm summarise the bleeding detection for all patient in an excel file. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
    Article
  6. 6
  7. 7

    Development of eCall for Malaysia's automotive industries by Abd Musthalib, Mohd Aliff, Mansor, Hasmah, Zainal Abidin, Zulkifli

    Published 2019
    “…For the collision detection, algorithm has been developed based on the data acquired from gyroscope and accelerometer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    License plate detection using deep learning object detection models by Leong, Kar Wan

    Published 2024
    “…For example, they can be slow in detection speed, not as accurate, and is difficult to develop. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection by Ayodele Nojeem, Lasisi

    Published 2018
    “…Thus, the optimization of the randomly detectors of V-Detectors algorithm with CSDE is proficient and suitable for anomaly detection tasks.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    DEVELOPMENT OF MOTION ANALYSIS IN CROWDED SCENES FOR REAL TIME VIDEO SURVEILLANCE by ABAS, NUR AFIQAH

    Published 2019
    “…In this project, Matlab software were used for the development of algorithm to detect crowd as well as motion detection. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Aerial photographs were taken using UAV at various heights and the images were then rectified to get the orthoimages. Next, the DoG algorithm was applied for the detection of visible cracks, and the results were compared with manually outlined cracks to determine the degree of the algorithm’s credibility. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16
  17. 17

    Motion detection and simulation study on human walking behavior by Loon, Cheong Wai

    Published 2012
    “…Architects, interior designer and transport engineers want to design and integrated a good building and facilities with particular emphasis on safety issues for pedestrians especially during evacuation scenario when emergency. The objective of this project is to analyse the human walking behaviour from video data, and develop an algorithm for human walking behaviour and emergency evacuation simulatioy The motion detection system were developed using Video and Image Processing Blockset in MAT LAB to collect the centroid coordinate of the pedestrians from the video to analyse the human walking behaviour. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Gait pattern detection for amputated prosthetic using fuzzy algorithm by Abdullah, Ahmad Faisal

    Published 2015
    “…The work included in this project focuses on developing a system to measure the angular displacement of human joint of lower part with patients having this problem and then applying gait phase detection using intelligent algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article