Search Results - (( based detection method algorithm ) OR ( parameters visualization using algorithm ))
Search alternatives:
- parameters visualization »
- method algorithm »
- based detection »
- using algorithm »
-
1
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
2
Visualization on colour based flow vector of thermal image for movement detection during interactive session
Published 2018“…Conventional system might cause false information with the present of shadow. Thus, methods employed in this work are Canny edge detector method, Lucas Kanade and Horn Shunck algorithms, to overcome the major problem when using thresholding method, which is only intensity or pixel magnitude is considered instead of relationships between the pixels. …”
Get full text
Get full text
Get full text
Article -
3
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The developments of algorithms for these methodologies are undertaken, which are fundamentally based on ray-tracing approach and SIRT. …”
Get full text
Get full text
Thesis -
4
The application of Hough Transform for corner detection
Published 2006“…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
Get full text
Get full text
Thesis -
5
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
6
HEP-2 CELL IMAGES CLASSIFICATION BASED ON STATISTICAL TEXTURE ANALYSIS AND FUZZY LOGIC
Published 2014“…This project proposes a pattern recognition algorithm consisting of statistical methods to extract seven textural features from the HEp-2 cell images followed by classification of staining patterns by using fuzzy logic. …”
Get full text
Get full text
Final Year Project -
7
Numerical Analysis of structural batteries response with the presence of uncertainty
Published 2023“…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Article -
8
Vibration analysis for early detection of bearing failures
Published 2024“…The vibration monitoring algorithm utilizes time-domain parameters, frequency domain analysis, and envelope analysis to assess bearing conditions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Numerical Analysis of Structural Batteries Response with the Presence of Uncertainty
Published 2023“…The proposed research is devoted to the uncertainty analysis of structural battery behavior under various parameters. To help with the analysis, a dedicated algorithm based on an elimination approach to solve numerical problems with uncertain parameters is successfully developed using Visual Basic. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes
Published 2019“…The findings prove that the proposed concept is applicable and provides an alternative method for conventional fringe analysis techniques such as transform-based algorithms or phase-shifting algorithms to advance high-speed 3D profilometry.…”
Get full text
Get full text
Thesis -
11
Facial geometry and speech analysis for depression detection
Published 2017“…The proposed system has been tested both in gender independent and gender based modes, and with different fusion methods. The algorithms were evaluated for several combinations of parameters and classification schemes, on the dataset provided by the Audio/Visual Emotion Challenge of 2013 and 2014. …”
Get full text
Get full text
Article -
12
G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi
Published 2015“…In beta-spline curve fitting, the control points are calculated using least squares method. The data points are first segmented in comer detection process, then the curve control points are calculated based on the comer points. …”
Get full text
Get full text
Thesis -
13
Processing and classification of landsat and sentinel images for oil palm plantation detection
Published 2022“…In distinguishing oil palm trees, optimisation of the pre-processing of the images enables the extraction of useful information based on its spectral signature, before they are utilised as an input for the soft computing method. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Performance evaluation on quantized weight for convolutional neural network based object detection
Published 2021“…Three types of scalar quantization are used to quantize the CNN weights namely symmetric uniform quantizer, asymmetric uniform quantizer and non-uniform quantizer designed using k-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
17
Visual Simultaneous Localization and Mapping Using Direct-Based Method for Unmanned Aerial Vehicle (UAV)
Published 2023“…The main studies in this project are focusing on the experimentation for DSO algorithm parameter setting. Another objective is to evaluate the parameter and performance of DSO algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
19
Risk assessment of dengue in Betong Sarawak using simple mathematical model
Published 2020Get full text
Get full text
Student Project -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Algorithms for building detection models are usually classified into two categories: misuse detection and anomaly detection. …”
Get full text
Get full text
Thesis
