Search Results - (( using personal process algorithm ) OR ( using codification using algorithm ))

Refine Results
  1. 1

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  2. 2

    Pengesan lalu lintas dengan kaedah pemerosesan imej by Riza Atiq O.K.Rahmat, Kasmiran Jumari, Azmi Hassan, Hassan Basri

    Published 2001
    “…This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Parallel Kalman filter-based multi-human tracking in surveillance video by Yussiff, A.-L., Yong, S.-P., Baharudin, B.B.

    Published 2014
    “…A novel approach to robust and flexible person tracking using an algorithm that integrates state of the arts techniques; an Enhanced Person Detector (EPD) and Kalman filtering algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Overhead view based person counting using deep learning by Kaw, Chee Zhao

    Published 2022
    “…Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient document retrieval system using locality sensitive hashing nearest neighbor algorithm and weighted jaccard distance for retrieving closest personalities by SE. Ben Georgea, G. Jeba Rosline, N. Balasupramanian, N.R. Wilfred Blessing

    Published 2024
    “…The personality document search results were compared for different distance measures using performance metrics like Normalized Discounted Cumulative Gain and Mean Average Precision. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
    Get full text
    Get full text
    Student Project
  10. 10

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…Student input initiates the process, with user interaction allowing for timetable customization based on personal preferences. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  12. 12

    Traffic Detectors Using Image Processing Method (Pengesan Lalu Lintas Dengan Kaedah Pemprosesan Imej) by Hassan, Azmi, Basri, Hassan, Rahmat, Riza Atiq, Kasmiran, Jumari

    Published 2001
    “…This study was conducted to develop efficient traffic detector using image-processing with a personal computer Traffic images were captured using ordinary analogue video camera and digitised using a video blaster. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin by Zainal Abidin, Abdul Hakim

    Published 2016
    “…This research purposed clustering algorithm to improve process extracting feature in images to get meaningful information because it can speed up the time to process of extracting meaningful information in images due to the efficient of the algorithm that has high performance to process the image. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Text based personality prediction from multiple social media data sources using pre-trained language model and model averaging by Christian, Hans, Suhartono, Derwin, Chowanda, Andry, Kamal Z., Zamli

    Published 2021
    “…Termed personality prediction, the process involves extracting the digital content into features and mapping it according to a personality model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Secured electrocardiograph (ECG) signal using partially homomorphic encryption technique–RSA algorithm by Shaikh, Muhammad Umair, Wan Adnan, Wan Azizun, Ahmad, Siti Anom

    Published 2020
    “…In recent times ECG is being used for identifying the person. Hence, there is a requirement for a system that involves digital signal processing and signal security so that the saved data are secured at one place and an authentic person can see and use the ECG signal for further diagnosis. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Development of efficient iris identification algorithm using wavelet packets for smartphone application by Gunawan, Teddy Surya, Solihin, Nurul Shaieda, Morshidi, Malik Arman, Kartiwi, Mira

    Published 2017
    “…Nowadays, iris recognition is widely used for personal identification and verification based on biometrical technology, especially in the smartphone arena. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20