Accurate Real Time Detection For Halal Logo Based On Fourier Magnitude Method
The research works carried out is the analysis of object detection methods and development of a new method in recognizing the approved Halal logo by JAKIM and their implementation in Android device. Currently, many irresponsible entrepreneurs use imitation ‘Halal’ logo on their products. Consequent...
| Main Author: | Ismail, Nurul Atiqah |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/18179/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=100053 |
| Abstract | Abstract here |
Similar Items
Real Time Support Systems
by: Wong, Kwok Thye
Published: (2001)
by: Wong, Kwok Thye
Published: (2001)
Halal Computerised Systems Framework For The Halal Pharmaceuticals
by: Raja Rina, Raja Ikram
Published: (2013)
by: Raja Rina, Raja Ikram
Published: (2013)
GA Based Model for Real Time Dispatching in Silterra-An Approach to Dispatcher Optimization
by: Sathasivam, Renetha Malar
Published: (2008)
by: Sathasivam, Renetha Malar
Published: (2008)
Real-Time Data Capturing for Reservoir Spillway Gate Operation Via Mobile Device
by: Faisal, Zulhumadi
Published: (2006)
by: Faisal, Zulhumadi
Published: (2006)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Real-time denial of service attack detection and mitigation on controller in software defined network environment / Bilal Ishfaq
by: Bilal , Ishfaq
Published: (2016)
by: Bilal , Ishfaq
Published: (2016)
Pelaksanaan Sistem Jaminan Halal Dalaman Kategori Premis Makanan Di Negeri Melaka
by: Hassan, Muhammad Haziq
Published: (2017)
by: Hassan, Muhammad Haziq
Published: (2017)
3D Virtual Reality Tour In Real Estate
by: Kavita Devi, d/o Nada Rajah
Published: (2008)
by: Kavita Devi, d/o Nada Rajah
Published: (2008)
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
by: Jia, Liu
Published: (2024)
by: Jia, Liu
Published: (2024)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Developing Time And Attendance System (TAS)
by: Tayfor, Mohammed Fahed
Published: (2008)
by: Tayfor, Mohammed Fahed
Published: (2008)
Utilising 3D Game Engine To Developing A Real-World Walkthrough-Virtual Reality Application
by: Mohd.Fairuz, Shiratuddin
Published: (2000)
by: Mohd.Fairuz, Shiratuddin
Published: (2000)
Real estate recommender systems using case-base reasoning approach
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
by: Alrawhani, Ebrahim Mohammed Abdo
Published: (2014)
Course Time Table Scheduling for a Local College
by: Lee, Su Leong
Published: (2009)
by: Lee, Su Leong
Published: (2009)
UUM Web-Based To Project Time Tracking System (PTTS)
by: Alfartas, Khaled Omran
Published: (2008)
by: Alfartas, Khaled Omran
Published: (2008)
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
by: Rasheed, Mohammad M.
Published: (2012)
by: Rasheed, Mohammad M.
Published: (2012)
PDF digital watermarking grayscale photocopy detection of printed documents
by: Soong, Hoong Cheng
Published: (2010)
by: Soong, Hoong Cheng
Published: (2010)
Recurrent error-based ridge polynomial neural networks for time series forecasting
by: Hassan Saeed, Waddah Waheeb
Published: (2019)
by: Hassan Saeed, Waddah Waheeb
Published: (2019)
An improved multilayer perceptron based on wavelet approach for physical time series prediction
by: Ali, Ashikin
Published: (2014)
by: Ali, Ashikin
Published: (2014)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Preliminary Analysis Of Intruder Detection System In UUM
by: Ibrahim, Yusof
Published: (2002)
by: Ibrahim, Yusof
Published: (2002)
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
Optimized feature construction methods for data summarization methods for data summarization of relational data
by: Florence Sia, Fui Sze
Published: (2014)
by: Florence Sia, Fui Sze
Published: (2014)
The effect of geographical region on the transition time of CMMI-based software process improvement / Fahad Hamed Alshammari
by: Alshammari, Fahad Hamed
Published: (2013)
by: Alshammari, Fahad Hamed
Published: (2013)
Utilization Of Java Reflection In Detecting Object Concept Similarities
by: Tan, Choo Jun
Published: (2000)
by: Tan, Choo Jun
Published: (2000)
Masked face detection system using google firebase
by: Azman, Anis Zahirah
Published: (2021)
by: Azman, Anis Zahirah
Published: (2021)
Comparative study on correctness and time taken of test case generation using EFG and BXT techniques for GUI application
by: Nser Brka, Mostafa
Published: (2015)
by: Nser Brka, Mostafa
Published: (2015)
A line traversal approach to boundary detection on cadastral map
by: Su, Benjamin Chung Tai
Published: (2006)
by: Su, Benjamin Chung Tai
Published: (2006)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
Digital Image Watermarking Using LSB Method
by: ., Maulidin
Published: (2011)
by: ., Maulidin
Published: (2011)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
Error magnitude and directional accuracy for time series forecasting evaluation
by: Nor, Maria Elena
Published: (2014)
by: Nor, Maria Elena
Published: (2014)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
Similar Items
-
Real Time Support Systems
by: Wong, Kwok Thye
Published: (2001) -
Halal Computerised Systems Framework For The Halal Pharmaceuticals
by: Raja Rina, Raja Ikram
Published: (2013) -
GA Based Model for Real Time Dispatching in Silterra-An Approach to Dispatcher Optimization
by: Sathasivam, Renetha Malar
Published: (2008) -
Real-Time Data Capturing for Reservoir Spillway Gate Operation Via Mobile Device
by: Faisal, Zulhumadi
Published: (2006) -
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
