Search Results - (( developing formative detection algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli by Ramli, Amar Aslam

    Published 2018
    “…As this project’s aim to develop android mobile application system, there are three important modules such as developed GPS system which used Google Maps API as location based for detection of online users. …”
    Get full text
    Get full text
    Student Project
  4. 4

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…In this project, the development of median filtering algorithm were used to improve the quality of mammography images, hence this image can be used to determined and to detect any abnormalities in the image. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Detecting JFIF header using FORHEADER by Kamaruddin Malik, Mohamad, Herawan, Tutut, Mustafa, Mat Deris

    Published 2011
    “…Foremost, Scalpel; however the algorithm used for header detection is not much discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Coalition formation for throughput enhancement via one-sided matching theory by Md Tahir, Mohammad Hazwan, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2016
    “…We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Coalition formation for throughput enhancement via one-sided matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2016
    “…We prove that the proposed algorithm leads to stable coalition formation in the cognitive radio network and show using simulations that the proposed matching algorithm for coalition formation yields significant gains in term of reduced false alarm probability and increased throughput per cognitive radio user as compared to the non-cooperative scenario.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Throughput enhancement in cognitive radio network via coalition formation using matching theory by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2015
    “…In this paper, we use the concepts from matching theory to form coalitions among cognitive radio users for cooperative spectrum sensing under target detection probability constraint. In the proposed model we make use of one sided matching theory to develop an algorithm for the cognitive radios to form coalitions of varying size to improve their individual gains (.e.g. throughput and probability of false alarm). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Prevention of Textual Plagiarism Application by Mohd Nor, Nor Atikah

    Published 2011
    “…The percentage of similarities will then be generated in a text format as the way to ease the lecturers for detecting plagiarism activities among students…”
    Get full text
    Get full text
    Final Year Project
  13. 13

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…Each grid cell is in charge of detecting objects within itself. Because of its speed and accuracy, YOLO is one of the most well-known object detection algorithms. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  16. 16

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…Security and privacy pose serious challenges in designing IoE environment which can be addressed by developing effective Intrusion Detection Systems (IDS). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The system takes as input a 24 bit RGB colour image which containts face(s). Before the detection process begins, the system pre-processes the image into a format required by the system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  20. 20

    Segmenting nodules of lung tomography image with level set algorithm and neural network by Chong, Soon Yee, Tan, Min Keng, Yeo, Kiam Beng, Mohd Yusof Ibrahim, Hao, Xiaoxi, Teo, Kenneth Tze Kin

    Published 2019
    “…The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings