Search Results - (( using function _ algorithm ) OR ( basic detection system algorithm ))

Refine Results
  1. 1

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  2. 2

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…This self-created motion detection software is then installed and run on the PC to function as a complete intelligent motion detection system.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.] by Che Abdullah, Sukarnur, Amari, Mohamad Dzulhelmy, Ohka, Masahiro

    Published 2019
    “…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…The system design part will explains the flow and functionality of the system structure. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…Power system state estimation constitutes one of the critical functions that are executed at the control centers. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Boosted HOG features and its application on object movement detection by Watada, J., Zhang, H., Melo, H., Sun, D., Vasant, P.

    Published 2018
    “…On that basis, we create a new feature with boosting algorithm to obtain more accurate result. In detecting vehicles part, we use the shadow underneath vehicle as the feature, so we can utilize it to detect vehicles in daytime. …”
    Get full text
    Get full text
    Article
  7. 7

    Boosted HOG features and its application on object movement detection by Watada, J., Zhang, H., Melo, H., Sun, D., Vasant, P.

    Published 2018
    “…On that basis, we create a new feature with boosting algorithm to obtain more accurate result. In detecting vehicles part, we use the shadow underneath vehicle as the feature, so we can utilize it to detect vehicles in daytime. …”
    Get full text
    Get full text
    Article
  8. 8

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition by Ali Adlan, Hanan Hassan

    Published 2004
    “…The algorithm enhances the recognition ability of the system compared to manual extraction and labeling of pattern classes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Speech emotion verification system (SEVS) based on MFCC for real time applications by Kamaruddin, Norhaslinda, Abdul Rahman, Abdul Wahab

    Published 2008
    “…Since features extracted using the MFCC simulates the function of the human cochlea, neural network (NN) and fuzzy neural network algorithm namely; Multi Layer Perceptron (MLP), Adaptive Network-based Fuzzy Inference System (ANFIS) and Generic Selforganizing Fuzzy Neural Network (GenSoFNN) were used to verify the different emotions. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Google the earth: what's next? by Mansor, Shattri

    Published 2010
    “…Through remote sensing, our basic scientific knowledge of the Earth and how it functions has expanded rapidly in the last few decades. …”
    Get full text
    Get full text
    Get full text
    Inaugural Lecture
  13. 13

    Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin, Rangkuti, Chalillullah

    Published 2010
    “…Analytical redundancy based fault detection and diagnosis system for an industrial gas turbine requires accurate model of the unit. …”
    Get full text
    Conference or Workshop Item
  14. 14

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…Palmprint recognition system in unrestricted environment requires a robust algorithm capable of adapting to complex environment. …”
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…I use the Basic Stamp2 as our controller. For this operation, if sensor detect obstacle, robot will move direction no restriction to reach to last post.…”
    Get full text
    Learning Object
  17. 17

    Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process by Muhammad Adam, Zahari

    Published 2017
    “…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…To verify the collision detection algorithm, it is tested with different positions and heights of the storage system during simulation of the virtual flexible manufacturing cell. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article