Search Results - (( developing world detection algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. Therefore, a Raspberry Pi drowsiness detection system based on Histogram of Oriented Gradient (HOG) algorithm and Eye Aspect Ratio (EAR) formula has been developed in this research. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Determining islanding operation using micro grid phasor measurement unit parameters by Arefin, A.A., Hasan, K.N.M., Romlie, M.F., Abdullah, M.F., Ali, M.N., Othman, M.L.

    Published 2020
    “…For improving the reliability of the micro grid network, a robust islanding detection algorithm is required. For creating a vigorous islanding detection algorithm voltage angle and current angle should be detected appropriately from the grid. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A pothole boundary detection algorithm using image segmentation technique in urban road by Mohd Shah, Hairol Nizam, Alshami, Abdallah M. M., Abdollah, Mohd Fairus, Ab Rashid, Mohd Zamzuri, Arshad, Mohd Ali

    Published 2025
    “…Employing Otsu's method and Canny edge detection, the algorithm seeks to accurately identify and contour the edges of potholes in urban road imagery. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    System setup on jetson nano for smart crowd covid monitoring system by Muhammad Othman, Maliki

    Published 2022
    “…Each grid cell is in charge of detecting objects within itself. Because of its speed and accuracy, YOLO is one of the most well-known object detection algorithms. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Determining islanding operation using micro grid phasor measurement unit parameters by Arefin, Ahmed Amirul, Md Hasan, Khairul Nisak, Romlie, Mohd Fakhizan, Abdullah, Mohd Faris, Ali, Mohd Nazri, Othman, Mohammad Lutfi

    Published 2020
    “…For improving the reliability of the micro grid network, a robust islanding detection algorithm is required. For creating a vigorous islanding detection algorithm voltage angle and current angle should be detected appropriately from the grid. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Domestic garbage target detection based on improved YOLOv5 algorithm by Ma, Haohao, Wu, Xuping, As'arry, Azizan, Han, Weiliang, Mu, Tong, Feng, Yanwei

    Published 2023
    “…The output of household garbage has increased rapidly in the world, due to the development of the economy, the improvement of the living standards of residents, and the acceleration of urbanization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES by HANIZAM, MOHD HAZIQ NAZMI

    Published 2019
    “…Not limited to commercial, this industry also includes naval sector and the small and medium industry of fisheries all over the world. The huge development throughout the industry has also develop many kinds of unlawful act such as piracy and illegal cargo transportation. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…The main objectives of HIDES are to create a reliable home security system with the implementation of IoT, to implement the object detection algorithm to determine the presence of humans, and to develop a smart mobile application for users to monitor their houses from anywhere in the world and be alerted if any threats are detected. …”
    Get full text
    Get full text
    Get full text
    Article