Search Results - (( flood detection method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Quranic diacritic and character segmentation and recognition using flood fill and k-nearest neighbors algorithm by Alotaibi, Faiz E A L

    Published 2019
    “…The diacritic detections are performed using a region-based algorithm with 89% accuracy and 95% improved by using flood fill segmentations method. 2DMED feature extraction accuracy was 90% for diacritics and 96% improved by applied CNN. …”
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Image processing-based flood detection by Ariawan, Angga, Pebrianti, Dwi, Ronny, Akbar, Yudha Maulana, Margatama, Lestari, Bayuaji, Luhur

    Published 2019
    “…The steps are as follows: (1) Region of Interest to create a portion of an image to filter or perform some other operation. (2) Brightness and contrast adjustment in order to get brighter and better image before the next process. (3) Grayscale and threshold to create segmentation object with Otsu-thresholding. ( 4) Edge detection algorithm to find edge points on a roughly horizontal water line and riverbank height By using the above method, the system can read and monitor the \Valer level of a river or other water bodies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    River segmentation with Atrous Convolution via DeepLabv3 / Nur Adilah Hamid by Hamid, Nur Adilah

    Published 2020
    “…Flood has been identified as a common issue for years. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  7. 7

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…The findings demonstrated that these methods are handcrafted and the algorithms need to be changed when applying to different images, which is not practical to be used during flood disasters. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Disaster monitoring in urban and remote areas using satellite stereo images: A depth estimation approach by Ahmad, Rana Fayyaz, Malik, Aamir Saeed, Qayyum, Abdul, Kamel, Nidal

    Published 2015
    “…In our paper, we have proposed a method to monitor the disaster using satellite stereo images which can detect and measure the intensity of damage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Disaster monitoring in urban and remote areas using satellite stereo images: A depth estimation approach by Ahmad, R.F., Malik, A.S., Qayyum, A., Kamel, N.

    Published 2015
    “…In our paper, we have proposed a method to monitor the disaster using satellite stereo images which can detect and measure the intensity of damage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol by Napiah, Mohamad Nazrin, Idris, Mohd Yamani Idna, Ramli, Roziana, Ahmedy, Ismail

    Published 2018
    “…However, these IDS methods only detect specific attack but fails when the attacks are combined. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Composite Drilling Monitoring System by Ruddin, Putri Annur Khaleeda Amer

    Published 2019
    “…Then, the images taken undergo image pre-processing and further analyse to detect wear by image fusion method. During the image pre-processing, the true colour image is converted into binary images and canny edge detector is applied to detect the flank boundary. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19
  20. 20