Search Results - (( using detection method algorithm ) OR ( software visualization system algorithm ))

Refine Results
  1. 1

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Then, the segmented cabbage sample will use the GLCM method for feature extraction. It is a method of extracting second-order statistical texture features to detect diseases more efficiently. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2
  3. 3
  4. 4

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…The purpose of this research project is to evaluate currently available crack detection systems and to develop an automated crack detection system using Aggregate Channel Features (ACF) that can be used with unmanned aerial vehicles (UAV). …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…The Face Detection System is implemented in visual Basic 6.0 The system was developed based on the Unified Process,which uses object-oriented paradigm as the basis of software development.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Hybrid sampling and random forest machine learning approach for software detect prediction by Md. Anwar, Hossen, Md. Shariful, Islam, Nurhafizah, Abu Talip, Md. Sakib, Rahman, Fatema, Siddika, Mostafijur, Rahman, Sabira, Khatun, Mohamad Shaiful, Abdul Karim, S. M, Hasan Mahmud

    Published 2019
    “…Third, Random Forest Importance and Chi-square algorithms are chosen to find out the factors which have high effect on software defect. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…The whole system has been developed using Microsoft Visual C++ programming language. …”
    Get full text
    Get full text
    Article
  10. 10

    Real time vein visualization using near-infrared imaging by May, Y. H., Ernawan, Ferda

    Published 2020
    “…Evolutionary prototyping method is used to develop the system and to ensure the quality of the final system through a few prototype refinement cycles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Tumor growth prediction using parallel computing: numerical solutions based on multi-dimensional partial differential equation (PDE) by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…This study focuses on the implementation of parallel algorithm for the simulation of tumor growth using two dimensional Helmholtz’s wave equation on a distributed parallel computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Fault Tolerance for Complex System by Chan, Shi Jing, Pebrianti, Dwi, M. F., Abas, Luhur, Bayuaji

    Published 2016
    “…For the purpose of visualizing the fault detection and isolation process, a two wheel robot is used in this study as a representation of a complex system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Fault Tolerance For Two Wheel Mobile Robot Using FSM (Finite State Machine) by Chan, Shi Jing, Pebrianti, Dwi, M. F., Abas, Bayuaji, Luhur

    Published 2017
    “…To better visualize the fault detection and isolation process, a two wheel robot is used in this study to represent the complex system. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…In the WMH classification stage, the research considered two types of WMH features of volume and intensities to classify the severity. Finally, a software system that utilized the best of above mentioned methods is proposed to perform the automated WMH detection. …”
    Get full text
    Get full text
    Book Section
  16. 16

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…In the WMH classification stage, the research considered two types of WMH features of volume and intensities to classify the severity. Finally, a software system that utilized the best of above mentioned methods is proposed to perform the automated WMH detection. …”
    Get full text
    Get full text
    Thesis
  17. 17

    DEVELOPMENT OF AN OFF-AXIS DIGITAL HOLOGRAPHIC MICROSCOPE FOR THREE-DIMENSIONAL (3D) MICROFLUIDICS APPLICATION by HAWA, RINGKAI

    Published 2019
    “…The optical system was initially designed using a CAD software. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18
  19. 19
  20. 20

    The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware by Nur Khairani, Kamarudin, Ahmad Firdaus, Zainal Abidin, Mohd Zamri, Osman, Alanda, Alde, Erianda, Aldo, Shahreen, Kasim, Mohd Faizal, Ab Razak

    Published 2024
    “…This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.…”
    Get full text
    Get full text
    Get full text
    Article