Search Results - (( based evaluation method algorithm ) OR ( software visualization using algorithm ))
Search alternatives:
- based evaluation »
- method algorithm »
- using algorithm »
-
1
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
Get full text
Get full text
Thesis -
2
Reversible Watermarking Based on Sorting Prediction Algorithm
Published 2015Get full text
Get full text
Get full text
Article -
3
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Common benchmark functions for metaheuristic evaluation: a review
Published 2017“…Hence, the proposed list of functions, based on existing literature, can be handily employed as an effective test-bed for evaluating either a new or modified variant of any existing metaheuristic algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The feature extraction methods evaluated were Grayscale Pixel Values, Mean Pixel Value of Channels, and Extracting Edge Features. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The software used for this prototype is Visual Basic 6.0. …”
Get full text
Get full text
Research Reports -
7
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The software used for this prototype is Visual Basic6.0. …”
Get full text
Get full text
Research Reports -
8
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
Get full text
Get full text
Thesis -
10
Real time vein visualization using near-infrared imaging
Published 2020“…Although the concept behind the technique is not complicated, the vein pattern acquisition method and the design and implementation of image processing algorithms become challenging. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…The current surface crack detection and length assessment on the damaged structures using the visual inspection method is conducted using manual observation based on trained eye's building inspector. …”
Get full text
Get full text
Student Project -
12
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…The retrieved data from the database system is saved in the proposed data format for surface movement visualization. In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
14
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…All of these steps were conducted using Orange data mining software. Results: Based on the findings, neural network scored the highest overall accuracy of 98.6% after conducting filtering technique. …”
Get full text
Get full text
Get full text
Article -
16
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. The algorithms’ accuracy is evaluated against the method adopted by China RMA comparing the Mean ASE values returned 98.84% accuracy using the same dataset. …”
Get full text
Get full text
Get full text
Thesis -
17
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…This paper presents an initial stage in an exploratory study that investigates the potentials of using CV automated image-based open- source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A novel method for vegetation encroachment monitoring of transmission lines using a single 2D camera
Published 2015“…A single camera mounted on power poles acquires images and sends them wirelessly to the base station. At base station, algorithm (software) trained by image processing and pattern recognition techniques is used to identify (height, depth, and width of encroached vegetation, etc.) …”
Get full text
Get full text
Article -
20
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
