Search Results - (( developing identity through algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Digital media-enhanced cultural brand development: creative strategies for urban identity construction by Wei, Zhang, Mastika, Lamat

    Published 2025
    “…This study investigates digital media-enhanced cultural brand development through creative strategies for urban identity construction, aiming to develop a comprehensive framework that extends integrated marketing communication theory while preserving cultural authenticity and enabling community participation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Face recognition for identify verification in exams locations by Ng, Suet Eng

    Published 2023
    “…In conclusion, this project to develop a facial recognition system for exam centres is a step towards enhancing exam integrity and preventing identity fraud. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri by Misri, Izzuddinazwan

    Published 2015
    “…R.T (2007) and these inform the development of a theoretical for assisting new design DNA transformation. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…Then, time processing and accuracy which one is the best of algorithms will be determine. The research is provide useful significance that able to detect identity of user allow as anonymous and able to detect location of user through IP Address. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Cross-cultural innovation: enhancing the Japanese Moku-zogan technique by Wan Omar, Wan Noor Faaizah, Subri, Shafilla, Ab Hamid, Abu Hanifa

    Published 2025
    “…In the modern era, Mokuzogan has embraced significant technological transformations, particularly through the integration of sophisticated algorithms in computer-aided design (CAD) and computeraided manufacturing (CAM). …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Energy efficient path-planning for unmanned aerial vehicle by Debnath, Sanjoy Kumar

    Published 2022
    “…This project develops an efficient path-planning algorithm for an unmanned aerial vehicle (UAV) in obstacle-rich environments considering minimum energy consumption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Specifically, the objectives of this thesis are (i) to develop an image registration technique based on multigraph matching, (ii) to detect occluded objects through exploration of candidate object correspondences in longer frame sequences, and (iii) to develop a robust graph coloring algorithm for multiple moving object detection under different transformations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Heritage Voices via Exploring Dayak Inspirations in Contemporary Art through the use of Artificial Intelligence in Graphic Design by Marzie, Hatef Jalil, Noorhaslina, Senin, Natasha, Rusdy Wong, Loh, Ngiik Hoon

    Published 2025
    “…The study is conducted in four phases: developing motifs from cultural identity icons, engaging students to create AI-assisted fashion products through a focus group, surveying students' experiences and verifying designs with Dayak artisans through interviews for in-depth insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory by Kamahazira Binti Zainal

    Published 2024
    “…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
    thesis::doctoral thesis
  18. 18

    Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.] by Mat Isa, Ahmad Azlan

    Published 2011
    “…The generality and efficiency of the proposed algorithm are demonstrated through simulations of an under-actuated robot manipulator, finally the obtained results were verified experimentally.…”
    Get full text
    Get full text
    Research Reports
  19. 19

    The impact of Xiaohongshu as the primary information hub: a case study among utar undergraduates by Eu, Jin Hau

    Published 2025
    “…Trust is established not through formal expertise, but rather through peer comments, relatable influencers, and perceived authenticity. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Face reidentification system to track factory visitors using OpenVINO by Wong, Yiek Heng

    Published 2020
    “…Developer may get the benefit when using OpenCV with OpenVINO. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis