Search Results - (( development information perceptions algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Tracking The Eyes Using Interdependence Mean Shift Tracking Algorithm With Appropriate Information Provided by Masrullizam, Mat Ibrahim, Syafeeza, Ahmad Radzi, Soraghan, John

    Published 2016
    “…Most of the developed eyes tracking algorithm are not considered the condition of the eyes that would provide the appropriate information to be used in the processes of the facial analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Density based subspace clustering: a case study on perception of the required skill by Rahmat Widia, Sembiring

    Published 2014
    “…SUBCLU and DAMIRA have no un-clustered real datasets; thus the perception of the results from the cluster will produce more accurate information. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…In summary, the study develops algorithms for accurate image quality prediction, refining images, and enhancing visual quality. …”
    Get full text
    Thesis
  7. 7

    Density subspace clustering: a case study on perception of the required skill by Sembiring, Rahmat Widia

    Published 2014
    “…SUBCLU and DAMIRA have no un-clustered real datasets; thus the perception of the results from the cluster will produce more accurate information. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Pseudo-colour with K-means Clustering Algorithm for Acute Ischemic Stroke Lesion Segmentation in Brain MRI by Abang Mohd Arif Anaqi, Abang Isa, Kuryati, Kipli, Ahmad Tirmizi, Jobli, Muhammad Hamdi, Mahmood, Siti Kudnie, Sahari, Aditya Tri, Hernowo, Sinin, Hamdan

    Published 2021
    “…The greyscale image is converted to pseudo-colour is to intensify the visual perception and deliver more information. Then, the algorithm segments the region of interest (ROI) using K-means clustering. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis by Kartiwi, Mira, Ab Rahman, Jamalludin, Nik Mohamed, Mohamad Haniki, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2017
    “…The predictive model was developed using Induction Decision Tree (ID3) algorithm, a popular data mining technique an exploratory tool for knowledge discovery. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Artificial Intelligence (AI) in the art and design industry / Fahmi Samsudin by Samsudin, Fahmi

    Published 2023
    “…Addressing these challenges requires the development of policies and regulations to ensure responsible AI development and application. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Augmented Reality Framework For Symbian Mobile Devices by Oui, Wei Wei

    Published 2013
    “…Augmented Reality (AR) is a technology that generates virtual information onto the real world to enhance user’s perception and interaction. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Watermarking technique based on ISB (Intermediate Significant Bit) by Zeki, Akram M., Abdul Manaf, Azizah, Olanweraju, Rashidah Funke

    Published 2010
    “…Digital watermarking is a special case of the general information hiding problem. It inserts a perceptually transparent pattern called watermark in an image called host or cover using an embedding algorithm. …”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Cooperative heterogeneous vehicular clustering for road traffic management / Iftikhar Ahmad by Iftikhar , Ahmad

    Published 2019
    “…Furthermore, a self-location calculation algorithm is developed to enable vehicles to calculate their location in the absence of global positioning system (GPS) signals. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of energy storage system for storing regenerative braking energy from train by Faizal Zamani, Dollah

    Published 2022
    “…This research aims to explore the development of energy storage systems in railway projects. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Human action recognition using slow feature analysis / Bardia Yousefi by Bardia, Yousefi

    Published 2016
    “…The cross-connection of the two pathways is implied throughout the present research via direct consideration, such as shared sketch algorithm and optical flow information, fuzzy max-product involvement, and scoring among each other. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Elicitation of conditional probability table (CPT) for risk analysis of biomass boiler in energy plant by Ahmad Nur Fikry, Zainuddin, Nurul Ain Syuhadah, Mohammad Khorri, Nurul Sa'aadah, Sulaiman, Alaw, Fares Ahmed

    Published 2022
    “…The formulation for boiler failures likelihood prediction that relies on experts’ perceptions was developed using the Weighted Sum Algorithm (WSA). …”
    Get full text
    Get full text
    Get full text
    Article