Match!
Ali Abd Almisreb
International University of Sarajevo
Image segmentationMalaySpeech recognitionComputer visionComputer science
30Publications
3H-index
32Citations
What is this?
Publications 35
Newest
#1Hana' Abd Razak (UiTM: Universiti Teknologi MARA)
#2Ali Abd Almisreb (International University of Sarajevo)H-Index: 3
Last. Nooritawati Md Tahir (UiTM: Universiti Teknologi MARA)H-Index: 12
view all 3 authors...
One of the advantages of transfer learning technique is its capability to learn new dataset using its finest pre-trained architecture. Other advantages of this technique are small dataset requirements along with faster learning process that could yield high accuracy results. Hence in this paper, anomalous gait detection or also known as forensic gait during housebreaking crime at the gate of residential units is discussed with transfer learning technique based on five popular pre-trained convolu...
Source
#1Syamimi Mohd Norzeli (TNB: Universiti Tenaga Nasional)
#2Ismarani Ismail (UiTM: Universiti Teknologi MARA)H-Index: 5
Last. Ammar Ahmed Nasser Al-Kahtani (TNB: Universiti Tenaga Nasional)H-Index: 2
view all 6 authors...
This paper presents a compact microstrip ultra-high frequency (UHF) reader patch antenna with complementary split ring resonator (CSRR) for radio frequency identification (RFID). The total size of the antenna is 208 × 208 × 1.6 mm 3 . The proposed antenna is designed, fabricated and measured in order to verify the proposed concept. The characterization for radiation parameters, like return loss, radiation pattern and antenna gain have been done experimentally. The proposed antenna is operated at...
Source
Last. Ali Abd AlmisrebH-Index: 3
view all 4 authors...
Coral reefs are organisms that mainly inhabit marine ecosystem. The formation of coral reefs are due to the symbiotic relationship between algae and coral animals and coral reefs have become an important element to the marine community. Coral reefs not only provides a shelter for coastal fishes and crustacean, but also protects and supply food to them. Reefs community are also useful to human that depends on marine products for their daily income. Other than that, coral reefs are one of the majo...
#1Hana' Abd Razak (UiTM: Universiti Teknologi MARA)
#2Ali Abd Almisreb (International University of Sarajevo)H-Index: 3
Last. Nooritawati Md Tahir (UiTM: Universiti Teknologi MARA)H-Index: 12
view all 4 authors...
Transfer learning is highly recommended in image recognition studies due to its ability in leveraging the finest architecture of pre-trained convolution neural networks (CNNs) for instance AlexNet, GoogLeNet and several others in learning new dataset at a faster learning process with smaller input images and could yield better classification rate as well. Hence, this study discussed deep learning with transfer learning approach in recognizing and classifying normal behavior and anomalous behavio...
Source
Internet of Things (IoT) paradigm became particularly popular in the last couple of years in such a way that the devices are present in almost every home across the globe. Using cheap components one can connect any device to the internet and enable information collecting from the environment, making everyday life a lot easier. Even though it does bring multiple advantages to the table, at the same time it brings certain challenges and vulnerabilities that need to be addressed. In this paper we f...
Source
#1Faris Fazlic (International University of Sarajevo)
#2Seyed Ali Hashemi (International University of Sarajevo)
Last. Norashidah Md Din (TNB: Universiti Tenaga Nasional)H-Index: 10
view all 6 authors...
With the global use of wireless sensor network technology in different fields and for different purposes such as health care monitoring, earth sensing, air pollution monitoring, military operations monitoring or surveillance system monitoring, a problem arises. Problem that could negatively impact previously started activities and observations if not handled in a right way. Authors of this paper discuss various vulnerabilities and security threads in different applications of WSN in the real wor...
Source
#1Haris Ackar (International University of Sarajevo)
#2Ali Abd Almisreb (International University of Sarajevo)H-Index: 3
Last. Mohamed A. Saleh (UiTM: Universiti Teknologi MARA)
view all 3 authors...
Image Enhancement is one of the most important and complex techniques in image processing technology. The main aim of image enhancement is to improve the visual appearance on an image and to offer a better representation of the image for Computer Vision Algorithms. In this paper,we is covered a few application fields of image enhancement with various images like grayscale, color, infrared and even with videos. The main objective of this paper is to highlight the drawbacks of the state of the art...
Source
#1Ali Abd Almisreb (International University of Sarajevo)H-Index: 3
#2Mohamed A. Saleh (UiTM: Universiti Teknologi MARA)
Source
#1Nursuriati JamilH-Index: 10
Last. Ali Abd AlmisrebH-Index: 3
view all 3 authors...
#1Ali Abd Almisreb (TNB: Universiti Tenaga Nasional)H-Index: 3
1234