Search Results - (( basic detection method algorithm ) OR ( using vectorisation using algorithm ))

Refine Results
  1. 1

    3D silhouette rendering algorithms using vectorisation technique from Kedah topography map by Che Mat, Ruzinoor, Nordin, Norani

    Published 2004
    “…The vectorisation software has been used for producing these data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…The Knowledge Discovery in Databases (KDD) process was followed as a formal data mining methodology where 1000 AI conference papers were carefully collected, pre-processed and transformed to numerical representations through TF-IDF vectorisation. A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…As network attackers keep changing their methods of attack execution to evade the deployed intrusion-detection systems (IDS), machine learning (ML) algorithms have been introduced to boost the performance of the IDS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Cars detection in stitched image using morphological approach by Joselyn, Jok.

    Published 2017
    “…The performance of the proposed cars detection algorithm could detect the cars fairly accurate. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…An ensemble feature selection method has been proposed in this paper to detect web spam. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The linear system is solved using bisection method of total least square approximation. Besides reducing the number of image regularities used and new method to solve the linear system, this study has proposed better solutions in terms of an enhanced thinning algorithm, a modified Freeman chain code algorithm as picture description language, and a new computational comer detection algorithm.…”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…The new method to detect motion is "vision motion detection". …”
    Get full text
    Get full text
    Thesis
  12. 12

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Prior to localization of the base of young corn tree, skeletonizing operation is performed to get the basic shape of the object. Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    INVESTIGATION OF CANNY TECHNIQUE FOR EDGE DETECTION IN IMAGE PROCESSING by Liew, Hui Fien

    Published 2004
    “…The aim of this project is to investigate the Canny technique for edge detection in detail. Then, a comparison of various methods for edge detection is made. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  17. 17

    Moving detection using cellular neural network (CNN) by Prema Latha, Subramaniam

    Published 2008
    “…In this paper, we proposed a simple and fast method to detect a moving object using Cellular Neural Network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms by Abd Manap, Nurulfajar, Soraghan, John J.

    Published 2012
    “…The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…A few experiments were conducted to get the performance of the methods focusing on color detection algorithms. The results of the experiments show that different approach angle and lighting of the hexacopter will result in different level of accuracy of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20