Search Results - (( based optimization method algorithm ) OR ( edge detection using algorithm ))
Search alternatives:
-
1
Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin
Published 2010“…It consists of several steps that make this method as an optimal edge detector. The objective of this research is gained from understanding of the problem statement. …”
Get full text
Get full text
Thesis -
2
Hereditary traits based on lips analysis using Ellipse Fitting / Tantty Roshaida Rozaini
Published 2010“…It consists of several steps that make this method as an optimal edge detector. The objective of this research is gained from understanding of the problem statement. …”
Get full text
Get full text
Thesis -
3
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
Get full text
Get full text
Thesis -
4
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
Get full text
Get full text
Thesis -
5
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
Get full text
Get full text
Article -
6
Automated threshold detection for object segmentation in colour image
Published 2016“…Most common solution of the task is the uses of threshold strategy based on trial and error method. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
-
8
Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach
Published 2022“…The introduced method detects the overlapping features for optimal edge classification. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
Get full text
Get full text
Get full text
Thesis -
10
Design and development of intelligent 3d model recognition and inspection system in die stamping industry
Published 2012“…The method is based on Canny edge detector to extract the surface defects based on optimal thresholding value. …”
Get full text
Get full text
Get full text
Get full text
Technical Report -
11
Defect detection of GFRP composites through long pulse thermography using an uncooled microbolometer infrared camera
Published 2024“…The TC success rate reached 0.91 for detecting FBH depth defects in raw images, which improved significantly after post-processing using Canny edge detection and Hough circle detection algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches
Published 2023“…In phase four, we calculate the CSP trust value to boost security. Based on CSP behavior, we introduced the Multi Behavior Analysis-based Nomadic People Optimizer method. …”
Get full text
Get full text
Get full text
Article -
13
Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients
Published 2017“…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
Get full text
Get full text
Get full text
Thesis -
14
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
15
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
Get full text
Get full text
Get full text
Article -
16
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Edge detection is the diverse way used to detect boundaries in digital images. …”
Get full text
Get full text
Article -
17
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli
Published 2015“…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
Get full text
Get full text
Thesis -
19
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article -
20
An adept edge detection algorithm for human knee osteoarthritis images
Published 2023“…Efficient edge detection depends on choosing the threshold; the choice of threshold directly determines the results of edge detection. …”
Conference Paper
