Search Results - (( its application matching algorithm ) OR ( its application testing algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Optical character recognition for Quranic image similarity matching by Alotaibi, Faiz, Abdullah, Muhamad Taufik, Abdullah, Rusli, O. K. Rahmat, Rahmita Wirza, Hashem, Ibrahim Abaker Targio, Sangaiah, Arun Kumar

    Published 2017
    “…The result of the proposed method is compared with the standard Mushaf al Madinah benchmark to find similarities that match with texts of the Holy Quran. The obtained accuracy was superior to the other tested K-nearest neighbor (knn) algorithm and published results in the literature. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…In order to demonstrate the feasibility of the algorithm, the engine was tested in the real application of football team management. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
    text::Thesis
  8. 8

    An improved wavelet digital watermarking software implementation by Khalifa, Othman Omran, Yusof, Yusnita

    Published 2011
    “…However, it is clearly observed that each of them is individually distinctive in terms of its scopes and applications [1][2][3]. The proposed system was thoroughly explained in this chapter. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    An Improved Wavelet Digital Watermarking Software Implementation by Khalifa, Othman Omran, Yusof, Yusnita, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2012
    “…However, it is clearly observed that each of them is individually distinctive in terms of its scopes and applications. In this paper, a proposed system was thoroughly explained. …”
    Get full text
    Get full text
    Proceeding Paper
  10. 10
  11. 11

    Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment by Aqel, Mohammad O. A.

    Published 2016
    “…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Computing non-contactable drowsiness monitoring system with mobile machine vision by Alixson Polumpung, Lorita Angeline, Helen Sin Ee Chuo, Tan, Min Keng, Lim, Kit Guan, Teo, Kenneth Tze Kin

    Published 2022
    “…Then, the real time detection and tracking are evaluated to assess its performance. Finally, the algorithm is applied to drowsiness detection using PERCLOS.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Scentopia: Navigating the World of Fragrance by Abd Mutalib, Nurrul Kamaliah

    Published 2024
    “…This research presents a comparative analysis that emphasises the unique qualities of Scentopia above other platforms in the market, highlighting its large database size, sophisticated recommendation algorithm, and high degree of personalisation. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…Mathematically, in PSNR, the improvement margin of SGWs-HMM was in range from 0.6dB up to 5.6dB compared with different denoising algorithms under investigation, and in SSIM it showed (~0.5-0.72) higher than HMM and Block matching 3D (BM3D) algorithms in different tested images. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…The rough sets vector quantization model proved its usefulness in the speech recognition framework, however it can be extended to different applications that involve large amounts of data such as speaker verification.…”
    Get full text
    Get full text
    Thesis
  20. 20