Search Results - (( program _ detection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…Programming software is required in order to execute the image acquisition and image analysis algorithm. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An optimal mesh algorithm for remote protein homology detection by M. Abdullah, Firdaus, M. Othman, Razib, Kasim, Shahreen, Hashim, Rathiah, Hassan, Rohayanti, Asmuni, Hishammuddin, Taliba, Jumail

    Published 2011
    “…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
    Get full text
    Get full text
    Article
  7. 7

    Multicolour object detection using multithreading by Saaidon, Nur'Ain, Sediono, Wahju

    Published 2015
    “…The number of threads created in multithreading’s algorithm is depending on the number of colours to be detected. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. The results show the algorithm's impressive performance with an 86% precision in predicting ASD traits. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques by Mohammad Syawaludin Syafiq, Hassan

    Published 2016
    “…In this study, a tracking algorithm is developed by means of image processing technique in detecting ambulance. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…However, every single tool has different ways of detection and accuracy of the detection. This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…The algorithm is developed so that it is capable to detect various objects by applying a bounding box on the frame image. …”
    Get full text
    Get full text
    Monograph
  19. 19
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis