A Review of External Wood Defect Detection
| Main Authors: | Jasni, Mohamad Zain, Nik Kamariah, Nik Ismail |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/1037/ http://umpir.ump.edu.my/id/eprint/1037/2/6_A_review_of_external_wood_defect_detection.pdf |
Similar Items
Optical Character Recognition By Using Template Matching (Alphabet)
by: Nadira, Muda, et al.
Published: (2007)
by: Nadira, Muda, et al.
Published: (2007)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
A Review of Medical Image Watermarking Schemes
by: Jasni, Mohamad Zain, et al.
Published: (2009)
by: Jasni, Mohamad Zain, et al.
Published: (2009)
Using Spiral Scan Technique for Medical Image Watermarking with Tamper Detection and Recovery
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
by: Afifah Nailah, Muhamad, et al.
Published: (2007)
A Review on the Development of Indonesian Sign Language Recognition System
by: Jasni, Mohamad Zain, et al.
Published: (2013)
by: Jasni, Mohamad Zain, et al.
Published: (2013)
ICT's Role in e-Governance in India and Malaysia: A Review
by: Jasni, Mohamad Zain, et al.
Published: (2012)
by: Jasni, Mohamad Zain, et al.
Published: (2012)
Vision-Based Sign Language Recognition Systems : A Review
by: Sutarman, na, et al.
Published: (2013)
by: Sutarman, na, et al.
Published: (2013)
Robust Image Watermarking Theories and Techniques: A Review
by: Jasni, Mohamad Zain, et al.
Published: (2014)
by: Jasni, Mohamad Zain, et al.
Published: (2014)
Reversible Medical Image Watermarking for Tamper Detection and Recovery with Run Length Encoding Compression
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
Ascaris Lumbricoides Egg Detection from Digital Microscopic Fecal Sample Images
by: S.M., Sulong, et al.
Published: (2012)
by: S.M., Sulong, et al.
Published: (2012)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Detecting head in pillow defect (HIP) by using deep learning and image processing technique
by: Tan, Wei Jin
Published: (2021)
by: Tan, Wei Jin
Published: (2021)
Organizational measurement of defect density
by: Hasim, Nurdatillah
Published: (2009)
by: Hasim, Nurdatillah
Published: (2009)
Wood species recognition based on phase - only correlation (POC) technique
by: Nik Kamariah, Nik Ismail
Published: (2013)
by: Nik Kamariah, Nik Ismail
Published: (2013)
A Faster External Sorting Algorithm Using No Additional Disk Space
by: Islam, Md. Rafiqul, et al.
Published: (2006)
by: Islam, Md. Rafiqul, et al.
Published: (2006)
Digital Watermarking in Medical Images
by: Jasni, Mohamad Zain
Published: (2005)
by: Jasni, Mohamad Zain
Published: (2005)
On Maximal Degree of Domination for Decision Making
by: Suhirman, ., et al.
by: Suhirman, ., et al.
Wood Plastic Composites (WPC)-Challenges in Prediction of Properties
by: Gupta, Ritu, et al.
Published: (2017)
by: Gupta, Ritu, et al.
Published: (2017)
Data-driven SIRMs-connected FIS for prediction of external tendon stress
by: Tay, K.M, et al.
Published: (2015)
by: Tay, K.M, et al.
Published: (2015)
A method for predicting defects in System Testing for V-Model
by: Muhammad Dhiauddin Mohamed Suffian,, et al.
Published: (2012)
by: Muhammad Dhiauddin Mohamed Suffian,, et al.
Published: (2012)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
A Review on Soft Computing Technique in Intrusion Detection System
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
by: Sulaiman, Noor Suhana, et al.
Published: (2012)
Applying Rough Set Theory for Student Clustering on Assessment Datasets
by: Suhirman, na, et al.
Published: (2013)
by: Suhirman, na, et al.
Published: (2013)
An Adjustable Approach to Interval-Valued Intuitionistic
Fuzzy Soft Sets Based Decision Making
by: Herawan, Tutut, et al.
Published: (2011)
by: Herawan, Tutut, et al.
Published: (2011)
Data Filling Approach of Soft Sets under Incomplete
Information
by: Herawan, Tutut, et al.
Published: (2011)
by: Herawan, Tutut, et al.
Published: (2011)
A review and bibliometric analysis of the current studies for the 6G networks
by: Salih, Qusay M., et al.
Published: (2024)
by: Salih, Qusay M., et al.
Published: (2024)
Email spam: A comprehensive review of optimize detection methods, challenges, and open research problems
by: Tusher, Ekramul Haque, et al.
Published: (2024)
by: Tusher, Ekramul Haque, et al.
Published: (2024)
The Design of Pre-Processing Multidimensional Data Based on
Component Analysis
by: Jasni, Mohamad Zain, et al.
Published: (2011)
by: Jasni, Mohamad Zain, et al.
Published: (2011)
Fragile Image Watermarking For Medical Images
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Cluster Evaluation of Density Based Subspace Clustering
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
A Comparative Agglomerative Hierarchical Clustering Method to Cluster Implemented Course
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
A Study on the Validation of Histogram Equalization as a Contrast Enhancement Technique
by: Jasni, Mohamad Zain, et al.
Published: (2012)
by: Jasni, Mohamad Zain, et al.
Published: (2012)
A Novel Soft Set Approach in Selecting Clustering Attribute
by: Qin, Hongwu, et al.
Published: (2012)
by: Qin, Hongwu, et al.
Published: (2012)
Clustering High Dimensional Data Using Subspace And Projected Clustering Algorithms
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
by: Sembiring, Rahmat Widia, et al.
Published: (2010)
Alternative Model for Extracting Multidimensional Data Based-on Comparative Dimension Reduction
by: Sembiring, Rahmat Widia, et al.
Published: (2011)
by: Sembiring, Rahmat Widia, et al.
Published: (2011)
Dual Watermarking Framework for Industrial Digital Images
by: Mohd Fairuz, Ramli, et al.
Published: (2007)
by: Mohd Fairuz, Ramli, et al.
Published: (2007)
Bit Allocation Strategy Based on Psychovisual Threshold in Image Compression
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Similar Items
-
Optical Character Recognition By Using Template Matching (Alphabet)
by: Nadira, Muda, et al.
Published: (2007) -
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006) -
A Review of Medical Image Watermarking Schemes
by: Jasni, Mohamad Zain, et al.
Published: (2009) -
Using Spiral Scan Technique for Medical Image Watermarking with Tamper Detection and Recovery
by: Afifah Nailah, Muhamad, et al.
Published: (2007) -
A Review on the Development of Indonesian Sign Language Recognition System
by: Jasni, Mohamad Zain, et al.
Published: (2013)