Search Results - (( using detection method algorithm ) OR ( software visualization system algorithm ))
Search alternatives:
- visualization system »
- method algorithm »
- system algorithm »
- using detection »
-
1
Cabbage disease detection system using k-NN algorithm
Published 2022“…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
3
Analysis of Microscopic Blood Samples for Detecting Malaria
Published 2013Get full text
Get full text
Undergraduates Project Papers -
4
Web Camera Application For Motion Detection
Published 2003“…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
Get full text
Get full text
Thesis -
5
Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun
Published 2023“…The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF) that can be used with unmanned aerial vehicles (UAV). …”
Get full text
Get full text
Get full text
Article -
6
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Face Detection System / Chan Beh Teng
Published 2004“…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
Get full text
Get full text
Thesis -
8
Hybrid sampling and random forest machine learning approach for software detect prediction
Published 2019“…Third, Random Forest Importance and Chi-square algorithms are chosen to find out the factors which have high effect on software defect. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…The whole system has been developed using Microsoft Visual C++ programming language. …”
Get full text
Get full text
Article -
10
Real time vein visualization using near-infrared imaging
Published 2020“…Evolutionary prototyping method is used to develop the system and to ensure the quality of the final system through a few prototype refinement cycles. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE)
Published 2010“…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
Get full text
Get full text
Get full text
Get full text
Book -
12
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Fault Tolerance for Complex System
Published 2016“…For the purpose of visualizing the fault detection and isolation process, a two wheel robot is used in this study as a representation of a complex system. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Fault Tolerance For Two Wheel Mobile Robot Using FSM (Finite State Machine)
Published 2017“…To better visualize the fault detection and isolation process, a two wheel robot is used in this study to represent the complex system. …”
Get full text
Get full text
Get full text
Article -
15
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…In the WMH classification stage, the research considered two types of WMH features of volume and intensities to classify the severity. Finally, a software system that utilized the best of above mentioned methods is proposed to perform the automated WMH detection. …”
Get full text
Get full text
Book Section -
16
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…In the WMH classification stage, the research considered two types of WMH features of volume and intensities to classify the severity. Finally, a software system that utilized the best of above mentioned methods is proposed to perform the automated WMH detection. …”
Get full text
Get full text
Thesis -
17
DEVELOPMENT OF AN OFF-AXIS DIGITAL HOLOGRAPHIC MICROSCOPE FOR THREE-DIMENSIONAL (3D) MICROFLUIDICS APPLICATION
Published 2019“…The optical system was initially designed using a CAD software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
18
-
19
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…The purpose of this study is to design a system for sorting algorithm visualization and implement the system.…”
Get full text
Get full text
Get full text
Article -
20
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
Published 2024“…This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.…”
Get full text
Get full text
Get full text
Article
