Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Munaisyah Abdullah"'
Publikováno v:
International Journal of Interactive Mobile Technologies (iJIM); Vol. 17 No. 07 (2023); pp. 32-46
The user experience, often known as UX, is the key factor in determining a product success and increase user’s acquisition. However, this field of research lacks conceptual and practical models to follow when designing pervasive technologies such a
Publikováno v:
Malaysian Journal of Computer Science. :94-105
Vehicle License Plate Recognition (LPR) has become a crucial system for various applications such as security monitoring, parking access, law enforcement and so on. LPR is employed for the identification of vehicles using their license plate. Recentl
Publikováno v:
2022 International Visualization, Informatics and Technology Conference (IVIT).
Publikováno v:
2022 International Visualization, Informatics and Technology Conference (IVIT).
Publikováno v:
Journal of Engineering and Applied Sciences. 14:8686-8691
Publikováno v:
IMCOM
Nowadays, the surveillance of criminal activities requires constant human monitoring. Most of these activities are happening due to handheld weapons mainly pistol and gun. Object detection algorithms have been used in detecting weapons like knives an
Publikováno v:
International Journal of ADVANCED AND APPLIED SCIENCES. 4:31-40
Autor:
Muhammad Yahya, Arif Warsi, Mohd Nizam Husen, Munaisyah Abdullah, Sheroz Khan, Nasreen Jawaid
Publikováno v:
2019 IEEE International Conference on Smart Instrumentation, Measurement and Application (ICSIMA).
Based on current situation around the world, there is major need of automated visual surveillance for security to detect handgun. The objective of this paper is to visually detect the handgun in real time videos. The proposed method is using YOLO-V3
Publikováno v:
Information Technology Journal. 15:116-122
Publikováno v:
IMCOM
Ad hoc m-commerce is an emerging application area for ad hoc wireless networks. It provides an alternative way for users to carry out m-commerce transactions without relying on any infrastructure support from a network service provider. Thus, the rel