Search Results - (( visualization _ prevention algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding by Safa, Soodabeh, Khalid, Fatimah

    Published 2020
    “…In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Building a feature-space for visual surveillance by Altahir, A.A., Asirvadam, V.S.

    Published 2014
    “…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A Multidimensional Search Space Using Interactive Genetic Algorithm by Farooq, H., Zakaria, M.N., Hassan, M.F., Sulaiman, Suziah

    Published 2010
    “…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Development of a new algorithm for segmentation of flotation froth images by Jahedsaravani, Ali, Marhaban, Mohammad Hamiruce, Massinaei, Mohammad, Saripan, M. Iqbal, Mehrshad, Naser, Mohd Noor, Samsul Bahari

    Published 2014
    “…In the paper, the marker-based watershed method is modified to prevent oversegmentation of large bubbles. The developed algorithm is validated using some froth images captured at different operating conditions, so the results indicate that the method can segment the mixture of big and small bubbles effectively.…”
    Get full text
    Get full text
    Article
  8. 8

    Predictive Analytics of the Likelihood Of Road Accidents by Location by Muhammed, Muhammad Bukhari

    Published 2019
    “…The dashboard will also contain at least one visual that gives the statistic of the likelihood of future accident to happen by location which its algorithm will be coded in R programming and be embedded into the main dashboard. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Development of visual odometry based machinery motion assessment system / Low Shee Teng by Low, Shee Teng

    Published 2022
    “…Method 3 would be combining Method 2 with linear based EVM, and Method 4 would be purely linear based EVM. These algorithms are implemented in terms of their computational complexity and visual quality as well as how they provide the amplified motion of video output. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2020
    “…Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    A BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM by Hamada , R. H. Al-Absi, Azween, Abdullah

    Published 2010
    “…Researchers have developed many algorithms to solve the problem of object recognition that are machine vision motivated. …”
    Get full text
    Get full text
    Thesis
  12. 12

    BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM by HASSAN AL-ABSI, HAMADA RASHEED

    Published 2010
    “…Researchers have developed many algorithms to solve the problem of object recognition that are machine vision motivated. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection by Wong, Shu Jie

    Published 2023
    “…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of auto-tracking mobile robot by Ahmad Shahrizan, Abdul Ghani, Suresh, Sundarajoo

    Published 2018
    “…Besides that, this algorithm also prevents tracking loss due to object color appears in the background.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Automatic control of flotation process using computer vision by Saravani, Ali Jahed

    Published 2015
    “…Bubble size distribution which is regarded as the most important characteristics of froth structure, is being addressed in this thesis by using a segmentation algorithm. A marker based watershed algorithm had been adopted and improved so as to prevent the over segmentation of big bubbles and able to adapt itself with different scenario of froth images. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Embedded Artificial Intelligent (AI) To Navigate Cart Follower by Tang, Khai Luen

    Published 2018
    “…The test MSE value is used to evaluate the performance of NN and validation MSE value is used to prevent overfitting. The weights and biases generated through the training process is depended on the training algorithm, initial weights and biases for training and the dataset used in the process. …”
    Get full text
    Get full text
    Monograph
  18. 18

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Improvement of Auto-Tracking Mobile Robot based on HSI Color Model by Sundarajoo, Suresh, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Besides that, this algorithm also prevents tracking loss due to object color appears in the background.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Real-time moving objects tracking for distributed smart video surveillances by A. Aziz, Nor Nadirah, Mohd Mustafah, Yasir, Azman, Amelia Wong, Shafie, Amir Akramin, Yusoff, Muhammad Izad, Zainuddin, Nor Afiqah, Rashidan, Mohammad Ariff

    Published 2016
    “…The proposed algorithm was formulated based on visual and temporal cues for multiple cameras using entering/exiting and merging/splitting cases to deal with appearance changes and occlusion problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article