Search Results - (( based optimization method algorithm ) OR ( edge detection using algorithm ))

Refine Results
  1. 1

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…It consists of several steps that make this method as an optimal edge detector. The objective of this research is gained from understanding of the problem statement. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hereditary traits based on lips analysis using Ellipse Fitting / Tantty Roshaida Rozaini by Rozaini, Tantty Roshaida

    Published 2010
    “…It consists of several steps that make this method as an optimal edge detector. The objective of this research is gained from understanding of the problem statement. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff by Md Ariff, Norharyati

    Published 2007
    “…For the image segmentation, genetic algorithm are use to segment the bone image and it is a new method that applies in the image processing field. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  6. 6

    Automated threshold detection for object segmentation in colour image by Akhtaruzzaman, Md., Shafie, Amir Akramin, Khan, Md. Raisuddin

    Published 2016
    “…Most common solution of the task is the uses of threshold strategy based on trial and error method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri by Pedram , Tabatabaeemoshiri

    Published 2025
    “…This work presents a novel graph-based semi-supervised learning (GSSL) algorithm designed for wafer defect detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Defect detection of GFRP composites through long pulse thermography using an uncooled microbolometer infrared camera by Anwar, Murniwati, Mustapha, Faizal, Abdullah, Mohd Na’im, Mustapha, Mazli, Sallih, Nabihah, Ahmad, Azlan, Mat Daud, Siti Zubaidah

    Published 2024
    “…The TC success rate reached 0.91 for detecting FBH depth defects in raw images, which improved significantly after post-processing using Canny edge detection and Hough circle detection algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Secured dynamic request scheduling and optimal CSP selection for analyzing cloud service performance using intelligent approaches by Ahmad Khan, Muzammil, Mahmood Khan, Shariq, Subramaniam, Siva Kumar

    Published 2023
    “…In phase four, we calculate the CSP trust value to boost security. Based on CSP behavior, we introduced the Multi Behavior Analysis-based Nomadic People Optimizer method. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Liver segmentation on CT images using random walkers and fuzzy c-means for treatment planning and monitoring of tumors in liver cancer patients by Moghbel, Mehrdad

    Published 2017
    “…The proposed method is based on a hybrid method integrating random walkers algorithm with integrated priors and particle swarm optimized spatial fuzzy c-means (FCM) algorithm with level set method and AdaBoost classifier. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Edge Detection Algorithm For Image Processing Of Search And Rescue Robot by A/L Sivem, Prasanthran

    Published 2016
    “…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition by Othman, Mahmod, Syed Abdullah, Sharifah Lailee, Ahmad, Khairul Adilah, Abu Bakar, Mohd Nazari, Mansor, Ab Razak

    Published 2016
    “…Edge detection algorithm is used to simplify image data by minimizing the amount of pixel to be processed, whereas the mathematical morphology is used for smoothing effects and localizing the object shape using mathematical theory sets.The discussion section focuses on the improved edge map and boundary morphology (EmaBm) algorithm as a new technique for shape boundary recognition.A comparative analysis of various edge detection algorithms is presented.It reveals that the LoG’s edge detection embedded in EmaBM algorithm performs better than the other edge detection algorithms for fruit shape boundary recognition. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images by Elaraby, Ahmed, Al-Ameen, Zohair

    Published 2022
    “…Edge detection is the diverse way used to detect boundaries in digital images. …”
    Get full text
    Get full text
    Article
  17. 17

    A novel steganography algorithm using edge detection and MPC algorithm by Aref Rezaei, Leili Farzinvash, Ali Farzamnia

    Published 2019
    “…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Dynamic partitioning and data allocation method on heterogeneous architecture / Muhammad Helmi Rosli by Rosli, Muhammad Helmi

    Published 2015
    “…Each experiment highlight the advantages and disadvantages of the experimental architecture.The disadvantages from each experiment prompts the design of dynamic parallel partitioning and allocating framework. The case study use for this experiment is Sobel edge detection algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks by Atiewi S., Al-Rahayfeh A., Almiani M., Abuhussein A., Yussof S.

    Published 2025
    “…To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
    Article
  20. 20

    An adept edge detection algorithm for human knee osteoarthritis images by Zahurul S., Zahidul S., Jidin R.

    Published 2023
    “…Efficient edge detection depends on choosing the threshold; the choice of threshold directly determines the results of edge detection. …”
    Conference Paper