Search Results - (( based constructive method algorithm ) OR ( points detection method algorithm ))

Refine Results
  1. 1

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…First, the grid mapping of the robot's workspace environment is constructed, and then the borders of the workspace environment are detected based on the new proposed function. …”
    Get full text
    Thesis
  3. 3

    Object Localization In 3D Point Cloud by Chung, Hui Sze

    Published 2020
    “…In the descriptor construction step particularly, two methods, Point Feature Histogram (PFH) and Signature of Histograms of OrienTations (SHOT) were compared. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali by Wan Ghazali, Wan Nurdayini Batrisyia

    Published 2024
    “…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
    Get full text
    Get full text
    Student Project
  6. 6

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach by Mohamed Yassin, Warusia

    Published 2015
    “…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Mobile robot positioning system by Khairulnizam Othman

    Published 2008
    “…Several motion control algorithm using BS2 software was develop to test the capabilities of system mobile motion in Y axis, X axis and other, particular attention is paid to evaluate the ability of the using Odometry to detect and correct positioning of the mobile platforms from 4 point. …”
    Get full text
    Learning Object
  10. 10

    Wifi positioning system / Amalina Abdul Halim by Abdul Halim, Amalina

    Published 2006
    “…During data collection, empirical model method is used in order to construct the reference table. …”
    Get full text
    Student Project
  11. 11

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Secondly, a new detection technique based on spectral direct detection is developed and compared to the reported detection techniques. …”
    Get full text
    Thesis
  12. 12

    Forecasting Tourism Market for Fiji based on Indicator Approach by Soh, Ann Ni

    Published 2019
    “…Apart from utilising the composite leading indicator approach, a filtering extraction method, a dating algorithm for turning point detection and directional accuracy and binomial tests, this study also included Markov regime switching as well, for identifying the transition probabilities. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Performance evaluation on quantized weight for convolutional neural network based object detection by Putra, Mohd Hasbullah

    Published 2021
    “…In this research, a real-time CNN based object detection system is presented. The system is designed based on the modified You Only Look Once (modified-YOLO) architecture which is constructed with only 7 CNN layers. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets by Pradhan, Biswajeet

    Published 2006
    “…Moreover, most of these algorithms are based either on Fourier transmission or on first order wavelet techniques. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim by Ibrahim, Mohd Faisal

    Published 2017
    “…First, a content negotiation and adaptation architecture was proposed to facilitate the process of identifying and detecting client device. It differs from other existing content negotiation approaches by introducing the idea of combining dynamic and static device capabilities detection methods. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Leak localization using empirical mode decomposition and teager-kaiser energy operator analysis based on pressure transient signal: experimental study by Pi Remli, Mohd Aminuddin, Ghazali, M. F., Azmi, W. H., Mohd Yusof, M. F., M. Yusop, Hanafi, Azmi, M. L.

    Published 2019
    “…This paper focused on leak identification and localization using Teiger-Kaiser Energy Operator (TKEO) as instantaneous frequency analysis (IFA) while Empirical Mode Decomposition (EMD) as decomposition method with implementation of Integrated Kurtosis Algorithm for Z-Filter (Ikaz) to Kurtosis ratio as the automatic selection criterion for intrinsic mode function (IMF). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Detection and evaluation of Caesium-137 point source using silicone photomultiplier sensor by Md. Ali, Sham Firdaus

    Published 2021
    “…Back Projection algorithm with Ram-Lak filter is also considered to be the most suitable technique to be applied for this gamma camera in reconstructing the image of a point source gamma emitting radioactive material. …”
    Get full text
    Get full text
    Thesis