{"id":922,"date":"2025-01-22T11:34:34","date_gmt":"2025-01-22T11:34:34","guid":{"rendered":"https:\/\/ftmk.utem.edu.my\/bengkel2\/?page_id=922"},"modified":"2025-01-22T11:34:34","modified_gmt":"2025-01-22T11:34:34","slug":"2024-2025-group-9","status":"publish","type":"page","link":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/2024-2025-group-9\/","title":{"rendered":"2024\/2025 \u2013 Group 9"},"content":{"rendered":"\n<p class=\"has-text-align-center has-luminous-vivid-amber-color has-text-color has-large-font-size\"><strong>Suspicious Behavior Detection using Deep Learning<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-scaled.jpeg\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" width=\"724\" height=\"1024\" src=\"https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-724x1024.jpeg\" alt=\"\" class=\"wp-image-957\" srcset=\"https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-724x1024.jpeg 724w, https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-212x300.jpeg 212w, https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-768x1086.jpeg 768w, https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-1086x1536.jpeg 1086w, https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-1448x2048.jpeg 1448w, https:\/\/ftmk.utem.edu.my\/bengkel2\/wp-content\/uploads\/2025\/01\/09-scaled.jpeg 1810w\" sizes=\"(max-width: 724px) 100vw, 724px\" \/><\/a><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Workshop 2 Showcase 2025: G9~Suspicious Behavior Detection\" width=\"1170\" height=\"658\" src=\"https:\/\/www.youtube.com\/embed\/OjRJM_FtK70?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\"><\/div>\n\n\n\n<div class=\"wp-block-column\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Suspicious Behavior Detection using Deep Learning<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"_links":{"self":[{"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/pages\/922"}],"collection":[{"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":3,"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/pages\/922\/revisions"}],"predecessor-version":[{"id":959,"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/pages\/922\/revisions\/959"}],"wp:attachment":[{"href":"https:\/\/ftmk.utem.edu.my\/bengkel2\/index.php\/wp-json\/wp\/v2\/media?parent=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}