Search Results - (( recognition application testing algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Algorithm of face recognition by principal component analysis by Al-Khateeb, Khalid A. Saeed, Yeop Johari, Jaiz Anuar

    Published 2002
    “…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Real-time vision-based Malaysian road sign recognition using an artificial neural network / Kh Tohidul Islam by Kh Tohidul , Islam

    Published 2017
    “…The system is based on two stages, one performs the detection and another one is for recognition. In the first stage, a hybrid color segmentation algorithm has been developed and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Handwritten digits recognition based on improved label propagation algorith by Jie, M., Aziz, I.A., Hasbullah, H., Azizan, S.A.B.

    Published 2016
    “…Handwritten digits recognition is a practical problem in pattern recognition applications, is of academic and commercial interest. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…This thesis proposes new algorithms based on Artificial Immune Recognition System to address the mentioned weaknesses and improve the performance of the Artificial Immune Recognition System. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Shape-based Road Sign Detection and Recognition for Embedded Application Using MATLAB by Md Sallah, Siti Sarah, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2010
    “…In this paper, we propose a road sign detection and recognition algorithm for an embedded application. The algorithm is based on the Hough transform method to detect lines in order to identify and determine the shape of the road sign. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali by Mohd Ali, Muhammad Afiq

    Published 2025
    “…The study focuses on designing a Hand Gesture Recognition application by means of the YOLOv8 deep learning algorithm to recognize hand gestures associated with autism spectrum disorder (ASD). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Online fingerprint recognition by Khairul Bariyah, Abd Rahim

    Published 2010
    “…Besides that, fingerprint recognition beyond criminal identification applications to several civilian applications such as access control, time and attendance, and computer user login. …”
    Get full text
    Get full text
    Undergraduates Project Papers