Masked face detection system using google firebase
The global health epidemic caused by the breakout of a coronavirus disease in 2019 (COVID-19) has had a significant impact on way we view our environment and live our daily lives. The number of people infected with Covid-19 is rapidly increasing. As a result, several countries are facing economic di...
| Main Author: | Azman, Anis Zahirah |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/6962/ |
| Abstract | Abstract here |
Similar Items
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012)
by: Shuwandy, Moceheb Lazam
Published: (2012)
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015)
by: Suryanti, Awang
Published: (2015)
Dynamic fast local Laplacian completed local ternary pattern (dynamic FLapCLTP) for face recognition
by: Sam, Yin Yee
Published: (2020)
by: Sam, Yin Yee
Published: (2020)
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
by: Rasheed, Mohammad M.
Published: (2012)
by: Rasheed, Mohammad M.
Published: (2012)
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)
by: Norulazmi, Kasim
Published: (2008)
Preliminary Analysis Of Intruder Detection System In UUM
by: Ibrahim, Yusof
Published: (2002)
by: Ibrahim, Yusof
Published: (2002)
Intrusion Detection by Port Scan Using Snort
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
by: Alkhushayni, Suboh Mohammad Shehadah
Published: (2008)
A malware analysis and detection system for mobile devices / Ali Feizollah
by: Ali, Feizollah
Published: (2017)
by: Ali, Feizollah
Published: (2017)
Multi-fish Detection And Tracking Using Track-mask Region
Convolutional Neural Network
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
by: Alshdaifat, Nawaf Farhan Fankur
Published: (2023)
Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection
by: Jia, Liu
Published: (2024)
by: Jia, Liu
Published: (2024)
Detecting Fraud Patterns in Telecommunications Using Case Based Reasoning
by: Shuaibu, Bala Musa
Published: (2008)
by: Shuaibu, Bala Musa
Published: (2008)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
An enhancement of classification technique based on rough set theory for intrusion detection system application
by: Noor Suhana, Sulaiman
Published: (2019)
by: Noor Suhana, Sulaiman
Published: (2019)
A fast learning network with improved particle swarm optimization for intrusion detection system
by: Ali, Mohammed Hasan
Published: (2019)
by: Ali, Mohammed Hasan
Published: (2019)
Human face detection from colour images based on multi-skin models, rule-based geometrical knowledge, and artificial neural network / Sinan A. Naji
by: Naji, Sinan A.
Published: (2013)
by: Naji, Sinan A.
Published: (2013)
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
by: Milad , Miri
Published: (2018)
by: Milad , Miri
Published: (2018)
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
by: Alaidaros, Hashem Mohammed
Published: (2017)
by: Alaidaros, Hashem Mohammed
Published: (2017)
Integration of blcm and flbp in low resolution face recognition
by: Mohammed, Ahmed Talab
Published: (2022)
by: Mohammed, Ahmed Talab
Published: (2022)
Detection-criterion independent proof for digital watermark detection : a support vector machine approach
by: Then,, Patrick Hang Hui
Published: (2007)
by: Then,, Patrick Hang Hui
Published: (2007)
Improving The Algorithm To Detect Internet Worms
by: Rasheed, Mohmmad M
Published: (2008)
by: Rasheed, Mohmmad M
Published: (2008)
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
by: Mazlan, Nurul Hidayah
Published: (2019)
by: Mazlan, Nurul Hidayah
Published: (2019)
Utilization Of Java Reflection In Detecting Object Concept Similarities
by: Tan, Choo Jun
Published: (2000)
by: Tan, Choo Jun
Published: (2000)
A line traversal approach to boundary detection on cadastral map
by: Su, Benjamin Chung Tai
Published: (2006)
by: Su, Benjamin Chung Tai
Published: (2006)
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
by: Amirulikhsan, Zolkafli
Published: (2008)
by: Amirulikhsan, Zolkafli
Published: (2008)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Vacant Parking Places System Using WAP Technologies
by: Jebur, Ghassan Thabit
Published: (2009)
by: Jebur, Ghassan Thabit
Published: (2009)
Design and development of skin detection model based deep learning on different skin tones
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
by: Al-Qaysi, Mohammed Ahmed Chyad
Published: (2021)
Web-Based Electrical Fault Diagnosis Using Expert System
by: Zakaria, Hussain
Published: (2002)
by: Zakaria, Hussain
Published: (2002)
A Non-template based Automatic Landmarking on 3-Dimensional (3D) Faces
by: Pui, Suk Ting
Published: (2022)
by: Pui, Suk Ting
Published: (2022)
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
by: Adewole Kayode, Sakariyah
Published: (2018)
by: Adewole Kayode, Sakariyah
Published: (2018)
A controller-agnostic random oracle based intrusion detection method in software defined networks / Adnan
by: Adnan, -
Published: (2016)
by: Adnan, -
Published: (2016)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
Behavioural Academic Self Esteem Deployment and Analysis Using Fuzzy Expert System
by: Afzanizam, Alias
Published: (2008)
by: Afzanizam, Alias
Published: (2008)
Neural network with agnostic meta-learning model for face-aging recognition / Rasha Ragheb Attaallah
by: Rasha Ragheb , Attaallah
Published: (2022)
by: Rasha Ragheb , Attaallah
Published: (2022)
Traveling Using Mass Rapid System : A Comparative Study Of Blind Searching Strategies
by: Syed Nidzamuddin, Syed Hassan
Published: (2008)
by: Syed Nidzamuddin, Syed Hassan
Published: (2008)
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
by: Najmun, Najmun
Published: (2024)
by: Najmun, Najmun
Published: (2024)
A Study on the Use of Computerised Accounting Systems in Small Business: A Case of Small Business in Libya
by: Saleh, Saleh Abdullah
Published: (2011)
by: Saleh, Saleh Abdullah
Published: (2011)
An acceptance model for contributing factors of continuous intention to use E-learning systems in Oman higher education institutions
by: Tawafak, Ragad M
Published: (2020)
by: Tawafak, Ragad M
Published: (2020)
Intelligent Automated Small and Medium Enterprise (SME) Loan Application Processing System Using Neuro-CBR Approach
by: Mohd Hanif, Yusoff
Published: (2011)
by: Mohd Hanif, Yusoff
Published: (2011)
Integration of Horde Email System and Mobile Application System
by: Sofiah, Othman
Published: (2010)
by: Sofiah, Othman
Published: (2010)
Similar Items
-
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
by: Shuwandy, Moceheb Lazam
Published: (2012) -
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015) -
Dynamic fast local Laplacian completed local ternary pattern (dynamic FLapCLTP) for face recognition
by: Sam, Yin Yee
Published: (2020) -
An Innovative Signature Detection System for Polymorphic and Monomorphic Internet Worms Detection and Containment
by: Rasheed, Mohammad M.
Published: (2012) -
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
by: Norulazmi, Kasim
Published: (2008)