Search Results - (( based detection method algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield by Shahrim, Muhamad Azim, Harmin, Mohammad Yazdi, Romli, Fairuz Izzuddin, Chia, Chen Ciang, Jung-Ryul, Lee

    Published 2022
    “…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
    Get full text
    Get full text
    Article
  4. 4

    Cabbage disease detection system using k-NN algorithm by Mohamad Ainuddin Sahimat

    Published 2022
    “…Finally, the KNN algorithm will be used to classify the disease based on sample nature and a cabbage disease data set. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5

    Gun detection system using Yolov3 by Warsi, Arif, Abdullah, Munaisyah, Husen, Mohd Nizam, Yahya, Muhammad, Khan, Sheroz, Jawaid, Nasreen

    Published 2019
    “…The objective of this paper is to visually detect the handgun in real time videos. The proposed method is using YOLO-V3 algorithm and comparing the number of false positive and false negative with Faster RCNN algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves by Lia, Kamelia

    Published 2024
    “…The proposed method integrates colour and texture feature-based image analysis with machine learning algorithms for classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…By reduction of recording EEG channels in the single trial based algorithms, the processing time of P300 detection decrease dramatically. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Subspace Techniques for Brain Signal Enhancement by Kamel , Nidal, Yusoff, Mohd Zuki

    Published 2009
    “…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
    Get full text
    Get full text
    Book Section
  15. 15

    A Hybrid Artificial Intelligence Model for Detecting Keratoconus by Alyasseri Z.A.A., Al-Timemy A.H., Abasi A.K., Lavric A., Mohammed H.J., Takahashi H., Milhomens Filho J.A., Campos M., Hazarbassanov R.M., Yousefi S.

    Published 2023
    “…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
    Article
  16. 16

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…The detection of semantic-based text anomaly is an interesting research area which has gained considerable attention from the data mining community. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A Time-Domain Subspace Technique for Estimating Visual Evoked Potential Latencies by Yusoff, Mohd Zuki, Kamel, Nidal

    Published 2010
    “…Further, GSA has been compared with a third-order correlation (TOC) method, using both realistic simulation and real patient data gathered in a hospital. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  18. 18

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20