Search Results - (( developing formative human algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Automatic assessment for engineering drawing by Goh, K.N., Mohd. Shukri, S.R., Manao, R.B.H.

    Published 2013
    “…This method is tedious as algorithms need to be developed for each shape to be assessed. …”
    Get full text
    Get full text
    Article
  4. 4

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform by Al-Deen, Ahmed A. Baha'a

    Published 2007
    “…The aim of this research is to develop a video watermarking algorithm to embed a binary image inside the uncoded video stream that acts as a logo. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Design and development of high performance swa cell design for local DNA sequence alignment by Syed Abdul Rahman, Syed Abdul Mutalib Al Junid

    Published 2017
    “…The OSL, OSA and ORSL proposed a new optimized two bit data representation format for DNA sequence characters, which is previously designed based on the eight bit ASCII 2 characters format. …”
    Get full text
    Get full text
    Thesis
  8. 8

    General Algorithm of n-Multiple Coil Shape for Variable Links Hyper-Redundant Robotic Manipulator by Jamali, Annisa, Khan, Md. Raisuddin, Rahman , Md Mozasser

    Published 2011
    “…The ‗S‘ shape formation, termed as multiple coil shape in hyper-redundant manipulator is essential for negotiating cluttered environment that exists inside the human body, engine compartment or within a collapsed building. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    HUMAN MOOD DETECTOR BY USING DIGITAL IMAGE PROCESSING by ALI, NOORAZLIN

    Published 2006
    “…These distinct criteria will he used to develop an algorithm that differentiates all the three emotions described before. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Audio files comparator using wavelet transform and similarity metrics by Lee, Da Long

    Published 2025
    “…This project is a development-based project revolving around signal processing. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    New Contrast Enhancement Technique For Non-Uniform Illumination Digital Colour Medical Images by Eng , Sheh Ling

    Published 2016
    “…In this research study, medical microscopic cervical cell and human epithelial type 2 (HEp-2) cell images were employed as case studies. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automatic image annotation using color segmentation / Siti 'Aisyah Sa'dan by Sa'dan, Siti 'Aisyah

    Published 2009
    “…The scope of this project is digital image of beach photographs with JPegs format. This project is implemented using a basic KMeans clustering as the algorithm for color segmentation and using direct technique to annotate the colors with the appropriate words by using predefined colors.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail by Mohd Sidek, Noorzahirah, Ismail, Mahadzir

    Published 2012
    “…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries. …”
    Get full text
    Get full text
    Research Reports
  17. 17

    Tracking of dynamic arm motion estimation and interaction with fuzzy control by Badi, Haitham, Hamza, Alaa, Mohd Yunus, Mohd Amin

    Published 2016
    “…Utilizing a virtual three-dimensional interactive rectan- gular parallelepiped, we establish correspondence be- tween the virtual scene and the users arm position in- formation. For robustly tracking the users arm position, an arm motion estimation method is designed based on the fuzzy predictive control fuzzy Mamdani algorithm theory. …”
    Get full text
    Get full text
    Article
  18. 18

    Disparity map calculation through epipolar lines estimation for 3D facial reconstruction by Cheddad, Abbas, Setan, Halim, Majid, Zulkepli

    Published 2005
    “…The algorithm is decomposed into two phases. The first phase deals with the location and extraction of human face from its cluttered background, this process is to focus on the region of interest (ROI) and to lessen down the computational burden. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Classification model for chlorophyll content using CNN and aerial images by Wagimin, Mohd Nazuan, Ismail, Mohammad Hafiz, Mohd Fauzi, Shukor Sanim, Seng, Chuah Tse, Abd Latif, Zulkiflee, Muharam, Farrah Melissa, Mohd Zaki, Nurul Ain

    Published 2024
    “…Therefore, this study proposed a classification approach in developing a deep learning model to analyse the plant’s health condition without human intervention. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis