Automated Fish Detection And Identification
Pengecaman dan pengenalpastian ikan menggunakan kaedah komputan telah menjadi sebuah bidang penyelidikan yang amat popular dalam kalangan para penyelidik. Kaedah-kaedah berkenaan penting kerana maklumat yang dipaparkan oleh ikan seperti pola trajektori, lokasi dan warna boleh menentukan sama ada ika...
| Main Author: | Wong , Poh Lee |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/32096/ http://eprints.usm.my/32096/1/WONG_POH_LEE.pdf |
Similar Items
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Multi-fish Detection And Tracking Using Track-mask Region
Convolutional Neural Network
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005)
by: CONNIE, T, et al.
Published: (2005)
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007)
by: Osman, Mohd. Azam, et al.
Published: (2007)
Enhanced Automated Framework For Cattle Tracking And Classification
by: Williams, Bello Rotimi
Published: (2022)
by: Williams, Bello Rotimi
Published: (2022)
Automated Content Based Image Retrieval Using Wavelets.
by: Irfan, A., et al.
Published: (2004)
by: Irfan, A., et al.
Published: (2004)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Automated Extraction Of Small Structures In Medical Images Based On Multi Scale Approach.
by: Foon, Dah Way, et al.
Published: (2004)
by: Foon, Dah Way, et al.
Published: (2004)
Development of a real time expert system for 11KV distribution automation
by: Uddin,, Md. Safi, et al.
Published: (2006)
by: Uddin,, Md. Safi, et al.
Published: (2006)
Enhanced Automated Heterogeneous Data Duplication Model Using Parallel Data Compression And Sorting Technique
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
by: Rostam, Nur Aqilah Paskhal
Published: (2019)
Automated Dynamic Service Placement And Replication Framework Using Team Formation Approach To Enhance Service Availability
by: Ooi, Boon Yaik
Published: (2012)
by: Ooi, Boon Yaik
Published: (2012)
Automated Detection of Anesthetic Depth Levels Using Chaotic Features with Artificial Neural Networks
by: Lalitha, V., et al.
Published: (2007)
by: Lalitha, V., et al.
Published: (2007)
Automatic Identification Of Close Languages: Case Of Malay And Indonesian.
by: Ranaivo, Bali, et al.
Published: (2002)
by: Ranaivo, Bali, et al.
Published: (2002)
Automatic Identification of Close Languages – Case Study: Malay and Indonesian.
by: Bali, Ranaivo-Malançon
Published: (2006)
by: Bali, Ranaivo-Malançon
Published: (2006)
Using Semantic Web, Ontologies and Blogs for Knowledge Identification, Organisation and Reuse.
by: Mohd. Kassim, Azleena, et al.
Published: (2007)
by: Mohd. Kassim, Azleena, et al.
Published: (2007)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
Image analysis by Tchebichef moments
by: Mukundan, Ramakrishnan, et al.
Published: (2001)
by: Mukundan, Ramakrishnan, et al.
Published: (2001)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
An Enhanced Artificial Immune System
Approach For Assembly Line Balancing
Problem Through Shifting Bottleneck
Identification
by: Khalid, Mohd Nor Akmal
Published: (2018)
by: Khalid, Mohd Nor Akmal
Published: (2018)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Scale-space segment growing for hierarchical detection of biliary tree structure
by: LOGESWARAN, RAJASVARAN
Published: (2005)
by: LOGESWARAN, RAJASVARAN
Published: (2005)
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Health Technos Private Limited (HTPL)
Intelligent Health Monitoring System
(IHMS)
Identification Of Criteria For Assessing
Risk Factors In Diabetes And Hypertension
by: Syed Abdul, Benzakhlr Faizal
Published: (2009)
by: Syed Abdul, Benzakhlr Faizal
Published: (2009)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Similar Items
-
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011) -
Multi-fish Detection And Tracking Using Track-mask Region
Convolutional Neural Network
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023) -
An automated palmprint recognition system
by: CONNIE, T, et al.
Published: (2005) -
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007) -
Enhanced Automated Framework For Cattle Tracking And Classification
by: Williams, Bello Rotimi
Published: (2022)