Search Results - (( program implementation detection algorithm ) OR ( using optimization using algorithm ))

Refine Results
  1. 1

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Optimizing Ram Testing Method For Test Time Saving Using Automatic Test Equipment by Kesavan Prabagaran, Premkumar

    Published 2017
    “…A memory Build-in Self-test (BIST) design with capability of algorithm failing sequence capture have been developed to implement in the Automate Test Equipment (ATE) flow for production screen. 3 selected algorithm have been tested on the 8 detect units in ATE flow to prove the concept of this method. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Traditional marble game using ant colony optimization / Muhammad Izzat Imran Che Isa by Che Isa, Muhammad Izzat Imran

    Published 2017
    “…In future, traditional marble game can be applied with other search algorithm to optimize the solution…”
    Get full text
    Get full text
    Thesis
  4. 4

    Flock optimization algorithm-based deep learning model for diabetic disease detection improvement by Balasubramaniyan, Divager, Husin, Nor Azura, Mustapha, Norwati, Mohd Sharef, Nurfadhlina, Mohd Aris, Teh Noranis

    Published 2024
    “…The collected data is processed by a Gaussian filtering approach that eliminates irrelevant information, reducing the overfitting issues. Then flock optimization algorithm is applied to detect the sequence; this process is used to reduce the convergence and optimization problems. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Parking finder mobile application by Tham, Chee Ming

    Published 2025
    “…In this system, computer vision and deep learning models such as YOLOv8 will be utilized for parking spaces and vehicle detection while the DeepSORT algorithm is implemented to track vehicle movement in real-time. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…By using Python in analytics projects, farmers can identify areas of concern, monitor crop health trends, and implement targeted interventions to optimize resource use and maximize yields. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Ensemble deep learning approach for apple fruitlet detection from digital images by Yusof, Mohamad Yusnisyahmi, Ishak, Iskandar, Sidi, Fatimah

    Published 2024
    “…A dataset containing 720 images of apple fruitlet is used in this project. To enhance the overall performance of the model, the revised CNN-based YOLOv5 ensemble model was implemented with the Sigmoid Linear Unit (SiLU) activation function, Batch Normalization, and SGD optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian by Tey, Siew Kian

    Published 2009
    “…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
    Get full text
    Get full text
    Monograph
  13. 13

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Meanwhile, an Arduino Mega 2560 (Controller) is used as microcontroller for obstacle avoidance and path optimization purpose respectively. …”
    Get full text
    Get full text
    Monograph
  14. 14

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…This thesis provided a detailed method in implementing the algorithm for face and person recognition by using haar cascade classifier feature detection and contour approximation. …”
    Get full text
    Get full text
    Monograph
  15. 15

    Implementation of Real-time Simple Edge Detection on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian , Patrick

    Published 2005
    “…The resulting edge detection images showed that a simple edge detection algorithm was implemented on Cyclone II FPGA for real-time image processing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development of cost efficient vision system for defects detection / Muhammad Zarif Kamarudin by Kamarudin, Muhammad Zarif

    Published 2010
    “…In this project, MATLAB platform is used to program the entire algorithm furthermore implementing Graphical User Interface to communicate between the vision system and the user. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Implementation of real-time simple edge detection on FPGA by P., Sebastian, M.N.B.M., Shukor, H.H., Lo

    Published 2007
    “…The resulting edge detection images showed that a simple edge detection algorithm was implemented on Cyclone II FPGA for real-time image processing. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item