Search Results - (( developing special detection algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…Many of the intrusion detection techniques developed on wired networks cannot be directly applied to MANET due to special characteristics of the networks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM by YVONNE, PHUA YEE WUN

    Published 2022
    “…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    A pothole boundary detection algorithm using image segmentation technique in urban road by Mohd Shah, Hairol Nizam, Alshami, Abdallah M. M., Abdollah, Mohd Fairus, Ab Rashid, Mohd Zamzuri, Arshad, Mohd Ali

    Published 2025
    “…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An estimation algorithm for improved maritime obstacle detection by Amir Alaqeb, Abdelrhman Mohamed, Rashid, Muhammad Mahbubur, Mohd Zaki, Hasan Firdaus, Embong, Abd Halim

    Published 2024
    “…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of control algorithm for a new 12s-6p single phase field excited flux switching motor by Amin, Faisal

    Published 2020
    “…For position detection, algorithms merely need a basic infrared transceiver sensor. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant by Al-Neami, F. B., Al-Kayiem, Hussain H.

    Published 2008
    “…The recent work presents a new method of fault diagnosis based on artificial neural networks and genetic algorithms. The networking is under development to resolve this problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Computer algorithm for automated detection of intramedullary rod hole position and orientation / Ahmad Zulhilmi Mohd Ziyadi by Mohd Ziyadi, Ahmad Zulhilmi

    Published 2014
    “…It is achieve by using special algorithm that detect holes 2D coordinates and average width of intramedullary rod. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Bayesian Network Classifiers for Damage Detection in Engineering Material by Mohamed Addin, Addin Osman

    Published 2007
    “…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
    Get full text
    Get full text
    Thesis
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A preliminary lightweight random forest approach-based image classification for plant disease detection by Mashitah Ibrahim, Muzaffar Hamzah, Mohammad Fadhli Asli

    Published 2022
    “…According to the demand of developing precision agriculture, this study plans to carry out comprehensive improvise research on the intelligent unmanned plant disease detection technology for agricultural ecosystems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…Over the last decade, many algorithms have been developed to address this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…Apart from that to see the output value of heart beat rate, one special algorithm is need to calculate the pulse. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    3D face registration across pose variation and facial expression using cross profile alignment by Anuar, Laili Hayati

    Published 2011
    “…Thus, as the first step prior face registration, the thesis proposed a novel nose tip region detection algorithm using localized point signature, developed specially to locate the nose tip region across various facial variation. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A review of neural networks in plant disease detection using hyperspectral data by Balasundram, Siva Kumar, Golhani, Kamlesh, Vadamalai, Ganesan, Pradhan, Biswajeet

    Published 2018
    “…This paper reviews advanced Neural Network (NN) techniques available to process hyperspectral data, with a special emphasis on plant disease detection. Firstly, we provide a review on NN mechanism, types, models, and classifiers that use different algorithms to process hyperspectral data. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article