Search Results - (( solution negative detection algorithm ) OR ( java location based algorithm ))

Refine Results
  1. 1

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Haar cascade algorithm for microsleep detection by Awang, Norkhushaini, Azhar, Ahmad Mirza

    Published 2025
    “…Based on these results, future research should focus on enhancing the core algorithm to be more resilient to variable lighting and distance, thereby reducing false positives and negatives. …”
    Get full text
    Get full text
    Article
  5. 5

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Dyslexia handwriting detection using Convolutional Neural Network (CNN) algorithm / Sofea Najihah Mohd Zaki by Mohd Zaki, Sofea Najihah

    Published 2024
    “…This project attempts to accurately detect the type of dyslexic handwriting. Convolutional Neural Network (CNN) algorithm was chosen as one of the possible solutions after a thorough analysis of many algorithms for dyslexic handwriting identification. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The solution integrates a Telegram bot for streamlined communication, utilizing PiCamera to capture facial photos and promptly detect signs of drowsiness. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Drowsiness detection and alert system using face recognition with Raspberry Pi / Nur Syazwina Mohd Fadzalisham, Nor Adora Endut and Muhammad Nizamuddin Rosli by Mohd Fadzalisham, Nur Syazwina, Endut, Nor Adora, Rosli, Muhammad Nizamuddin

    Published 2023
    “…The solution integrates a Telegram bot for streamlined communication, utilizing Pi Camera to capture facial photos and promptly detect signs of drowsiness. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    Smart Digital Signage With Eye Tracking System by Chung , Soon Zhi

    Published 2017
    “…A sanity checking algorithm is proposed to filter out the wrong detected eyes and improve the overall detection rate. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Scrutinized System Calls Information Using J48 And Jrip For Malware Behaviour Detection by Abdollah, Mohd Faizal, S. M. M Yassin, S. M. Warusia Mohamed, Mohd Saudi, Nur Hidayah

    Published 2019
    “…However, such detection method still lacks in differentiate the malware behaviours and cause the rate of falsely identified rate, i.e., false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Embedded mini-analyzer device for in situ wide range heavy metal identification and concentration detection by Mazaheri, Amin

    Published 2018
    “…With the advancement of integrated technology, in-situ electrochemical systems provide feasible solution for sensitive detection and miniaturized platform. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…The effectiveness of the IADS has been evaluated under different detection capabilities (i.e., false positive, false negative, true positive, true negative, false alarm, accuracy,detection rate, attack data detection rate, normal data detection rate) and detection times using the DARPA 1999 and ISCX 2012 intrusion detection benchmark datasets as well as with Live-data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Coordinated Malware Eradication And Remediation Project (CMERP) by Abdollah, Mohd Faizal, S.M.M Yassin, S.M.Warusia Mohamed, Mas’ud, Mohd Zaki, Selamat, Siti Rahayu, Yusof, Robiah, Ahmad, Rabiah, Shahrin @ Sahibuddin, Shahrin

    Published 2019
    “…However, such detection method still lack in differentiate the malwares behaviours and cause the rate of falsely identified rate i.e. false positive and false negative increased. …”
    Get full text
    Get full text
    Get full text
    Technical Report
  19. 19

    Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images by Boroujeni, Farsad Zamani, O. K. Rahmat, Rahmita Wirza, Mustapha, Norwati, Affendey, Lilly Suriani, Maskon, Oteh

    Published 2011
    “…The conventional seed point selection algorithms either rely merely on signal-to-noise ratio analysis, which results in a large number of false traces, or impose a set of strict geometrical validation rules that lead to more false negatives and require more computation time. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Low fatigue walking-in-place locomotion technique for mobile VR using smartphone’s inertia sensors by Ang, Yang Yi

    Published 2020
    “…Bilateral Horizontal Impulse (BHI) detection algorithm is introduced to detect the positive and negative impulsive force captured from yaxis of accelerometer. …”
    Get full text
    Get full text
    Thesis