Investigating the effectiveness of point features matching for detecting gun items
Every entry point has national high-security to ensure no firearms brought illegally. This is a crime if carry firearms without consent from authorities. However, even though many ways have been implemented to detect gun items from entering the county, such as Point Features Matching (PFM) the gun s...
| Main Author: | Nur Najwa, Ibrahim |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/27180/ http://umpir.ump.edu.my/id/eprint/27180/1/Investigating%20the%20effectiveness%20of%20point%20features%20matching%20for%20detecting%20gun.pdf |
Similar Items
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011)
by: Tan, Ian K. T., et al.
Published: (2011)
UMP Item Trading Application
by: Loh, Hin Ye
Published: (2023)
by: Loh, Hin Ye
Published: (2023)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
by: Diaa , Mohammed Hassan Uliyan
Published: (2016)
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)
by: Edris, Khalid Edris, et al.
Published: (2014)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
An empirical comparative study of instance-based schema matching
by: Alzeber, Mogahed, et al.
Published: (2018)
by: Alzeber, Mogahed, et al.
Published: (2018)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
A review on distance measure formula for enhancing match detection process of generic code clone detection model in Java Application
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2021)
Mechanize feature-to-feature matching system utilizing repeated inspection data
by: Mat Din, Mazura, et al.
Published: (2008)
by: Mat Din, Mazura, et al.
Published: (2008)
An application of Bloom's taxanomy in generation and assessment of examination question items
by: Nordin, Azlin, et al.
Published: (2014)
by: Nordin, Azlin, et al.
Published: (2014)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Scalable technique to discover items support from trie data structure
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
Intelligent Mobile Maid Matching Using Similarity Search
by: Ong, Shu Xian
Published: (2020)
by: Ong, Shu Xian
Published: (2020)
Deriving skyline points over dynamic and incomplete databases
by: Babanejad, Ghazaleh, et al.
Published: (2017)
by: Babanejad, Ghazaleh, et al.
Published: (2017)
Item-based collaborative filtering technique for movie recommender based on user preference
by: Wong, Wai Leong
Published: (2018)
by: Wong, Wai Leong
Published: (2018)
Feature-Based Object Detection and Tracking: A Systematic Literature Review
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2023)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2023)
Fuzzy Inventory Model for Imperfect Items with Price Discount
and Penalty Maintenance Cost
by: Kuppulakshmi, V., et al.
Published: (2023)
by: Kuppulakshmi, V., et al.
Published: (2023)
A web-based warehouse inventory management system for stock items tracking
by: Low, Elaine Jing Yi
Published: (2022)
by: Low, Elaine Jing Yi
Published: (2022)
Template matching analysis using neural network for mobile iris recognition system
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
by: Anis Farihan, Mat Raffei, et al.
Published: (2020)
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
Malware Analysis with Multiple Features
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2012)
A Survey of schema matching research using database schemas and instances
by: Aljuboori, Ali Alwan, et al.
Published: (2017)
by: Aljuboori, Ali Alwan, et al.
Published: (2017)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Combined support vector machine and pattern matching for hadith question classification system
by: Ali Muttaleb, Hasan, et al.
Published: (2018)
by: Ali Muttaleb, Hasan, et al.
Published: (2018)
Comparative investigation of bagging enhanced machine learning for early detection of HCV infections using class imbalance technique with feature selection
by: Tusher, Ekramul Haque, et al.
Published: (2025)
by: Tusher, Ekramul Haque, et al.
Published: (2025)
The Construction of Web Navigation Model in
Online Automated Universities' Students Matching
System (OAUSMS)
by: Shamsul Jamel Elias,, et al.
Published: (2010)
by: Shamsul Jamel Elias,, et al.
Published: (2010)
Mysztech Solution (Mts) Point Of Sales (Pos) System
by: Mohamad Mohsin, Ismail
Published: (2023)
by: Mohamad Mohsin, Ismail
Published: (2023)
Malware detection using static analysis in android: A review of FeCO (features, classification, and obfuscation)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
by: Rosmalissa, Jusoh, et al.
Published: (2021)
Detection of colon cancer based on microarray dataset using machine learning as a feature selection and classification techniques
by: A. S. M, Shafi, et al.
Published: (2020)
by: A. S. M, Shafi, et al.
Published: (2020)
Knowledge-based semantic relatedness measure using semantic features
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
Determining the best weightage feature in parameterization process of GCCD model for clone detection in C-based applications
by: Nurul Syafiqah, Zaidi, et al.
Published: (2023)
by: Nurul Syafiqah, Zaidi, et al.
Published: (2023)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Utilizing word matching for duplicate article removal : a study using Malaysian online news feed
by: Su, Tze-Wei, et al.
Published: (2011)
by: Su, Tze-Wei, et al.
Published: (2011)
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
by: Lai, Chor Kiew, et al.
Published: (2021)
by: Lai, Chor Kiew, et al.
Published: (2021)
A review of feature selection on text classification
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Feature selection method based on sparse representation classification for face recognition
by: Boon, Yinn Xi *, et al.
Published: (2014)
by: Boon, Yinn Xi *, et al.
Published: (2014)
Similar Items
-
Effectiveness of RSS feed item duplication detection using word matching
by: Tan, Ian K. T., et al.
Published: (2011) -
UMP Item Trading Application
by: Loh, Hin Ye
Published: (2023) -
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019) -
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
by: Diaa , Mohammed Hassan Uliyan
Published: (2016) -
Steg Analysis Algorithm for Edge Adaptive Least Significant Bit Matching Revisited Detection
by: Edris, Khalid Edris, et al.
Published: (2014)