Search Results - (( key detection process algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC) by Ibrahim, Kamarul 'Asri, Ahmad, Arshad, Ali, Mohamad Wijayanuddin, Mak, Weng Yee

    Published 2006
    “…Multivariate Statistical Process Control (MSPC) uses historical data of processes to develop useful process fault detection, diagnosis and control tools. …”
    Get full text
    Get full text
    Monograph
  2. 2

    Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree by Bhuiyan, Sharif Shah Newaj, Khalifa, Othman Omran

    Published 2018
    “…It always gives successful stabilization output. This process doesn’t need to analyze the key-points twice. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  4. 4

    Improving the efficiency of clustering algorithm for duplicates detection by Emran, Nurul Akmar, Abdul Rahim, Abdulrazzak Ali Mohamed, Kamal Baharin, Safiza Suhana, Othman, Zahriah, Salem, Awsan Thabet, Abd Aziz, Maslita, Md. Bohari, Nor Mas Aina, Abdullah, Noraswaliza

    Published 2023
    “…Clustering method is a technique used for comparisons reduction between the candidates records in the duplicate detection process. The process of clustering records is affected by the quality of data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…The objective of this work is to improve our previous action key frames extraction algorithm (AKF) by adapting a threshold which selects action key frames as final key frames. …”
    Get full text
    Get full text
    Article
  6. 6

    Modified Miller-Rabin primality test algorithm to detect prime numbers for generating RSA keys by Shereek, Balkees Mohamed

    Published 2016
    “…The Rivest-Shamir-Adleman algorithm (RSA) is one of the most well-known and strongest public key cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Landmark detection for vision based of autonomous guided vehicle by Nurul Atiqah Syazwani, Kamarudin

    Published 2012
    “…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…It is a method of extracting second-order statistical texture features to detect diseases more efficiently. Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Augmenting the Robustness and Efficiency of Violence Detection Systems for Surveillance and Non-Surveillance Scenarios by MUHAMMAD, SHOAIB, ASAD, ULLAH, Irshad, Ahmed Abbasi, Fahad, Algarni, Adnan Shahid, Khan

    Published 2022
    “…The keyframes selection process is critical in violence detection systems, as it reduces computational complexity and enhances accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Road triangle detection for non-road area elimination using lane detection and image multiplication by Aminuddin, Nur Shazwani, Mat Ibrahim, Masrullizam, Mohd Ali, Nursabillilah, Ahmad Radzi, Syafeeza, Darsono, Abd Majid, Wong, Yan Chiew

    Published 2017
    “…The background has become the key issue in maintaining the accuracy of final analysis for object detection in the development of an image processing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm by Khalifa, Othman Omran, Wajdi, Muhammad H., Saeed, Rashid A., Hassan Abdalla Hashim, Aisha, Ahmed, Muhammed Z., Ali, Elmustafa Sayed

    Published 2022
    “…Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A comprehensive comparative experiment of edge detection for OMR by Sahri, Zahriah, Othman, Zuraini, Kasmin, Fauziah, Basiron, Halizah

    Published 2022
    “…This study compares different established edge detection algorithms to detect edges of interest in OMR answer sheets such as bubbles or rectangles containing the bubbles. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Embedded vision system development using 32-bit Single Board Computer and GNU/Linux by Nur Farhan, Kahar

    Published 2011
    “…The stationary vehicle detection process is executed on the embedded vision system to evaluate the accuracy of detection made by the system. …”
    Get full text
    Thesis
  16. 16

    Efficient 3D stereo vision stabilization for multi-camera viewpoints by Bhuiyan, Sharif Shah Newaj, Khalifa, Othman Omran

    Published 2019
    “…In this paper, an algorithm is developed in 3D Stereo vision to improve image stabilization process for multi-camera viewpoints. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    K-gen phishguard: an ensemble approach for phishing detection with k-means and genetic algorithm by Al-Hafiz, Ali Raheem, Jabir, Adnan J., Subramaniam, Shamala

    Published 2025
    “…In the first phase, the best set of features is identified by the Genetic algorithm and is utilised by the K-means clustering algorithm to divide the dataset into groups with similar traits. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A modified watershed segmentation algorithm for automated lung cancer lesion detection in CT scan images / Nur Najihah Sofia Mohd Marzuki by Mohd Marzuki, Nur Najihah Sofia

    Published 2024
    “…The performance of the segmentation process in conventional and modified watershed segmentation technique for detecting lung lesion, which produce average F-Score is 97.80% and 99.09%, respectively. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evaluation of the Transfer Learning Models in Wafer Defects Classification by Jessnor Arif, Mat Jizat, Anwar, P. P. Abdul Majeed, Ahmad Fakhri, Ab. Nasir, Zahari, Taha, Yuen, Edmund, Lim, Shi Xuen

    Published 2022
    “…In a semiconductor industry, wafer defect detection has becoming ubiquitous. Various machine learning algorithms had been adopted to be the “brain” behind the machine for reliable, fast defect detection. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…Sensor failure, environmental changes, or bad weather can lead to the emergence of abnormal data, which can affect the decision-making process and may have disastrous consequences. Based on the above problems, this study addresses this challenge by proposing a hybrid anomaly detection model (called CAE-RF) that combines convolutional autoencoders and random forest algorithms to achieve efficient and accurate identification of abnormal data patterns to improve the safety of autonomous driving systems. …”
    Get full text
    Get full text
    Get full text
    Article