Search Results - (( developing human normalization algorithm ) OR ( java visualization system algorithm ))
Search alternatives:
- normalization algorithm »
- visualization system »
- human normalization »
- java visualization »
- developing human »
- system algorithm »
-
1
Visdom: Smart guide robot for visually impaired people
Published 2025“…This report details the development of an autonomous guide robot system for visually impaired individuals using the ROS 2 framework and the Wheeltec R550 Robot platform. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
3
-
4
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…Up to now Malaysia does not have any source for normal trait values of human face. This algorithm can be used to calculate facial traits for building a nationwide database that can be used to compare normal traits with abnormal ones and then plan the surgery procedures. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…For this purpose, two algorithm are has been developed to automatically detect the OC and IC. …”
Get full text
Get full text
Thesis -
6
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
7
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project -
8
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
Get full text
Get full text
Thesis -
9
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The experimental results reveal that the developed algorithm is able to achieve an accuracy of 87.82% F1-measure based on images from the ECU database. …”
Get full text
Get full text
Thesis -
10
Fuzzy qualitative human motion analysis
Published 2009“…First, a data-quantization process is proposed to relax the computational complexity suffered from visual tracking algorithms. Second, a novel human motion representation, i.e., qualitative normalized template, is developed in terms of the fuzzy qualitative robot kinematics framework to effectively represent human motion. …”
Get full text
Get full text
Article -
11
Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid
Published 2015“…From the result analysis, the developed control algorithm shows that the realtime GRF measurement has the ability to enhance the AAFO functional performance and improve the patient gait.…”
Get full text
Get full text
Thesis -
12
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
13
Feature extraction from oil palm in vitro shoot images
Published 2010“…The feature extraction techniques are discussed in this article. The algorithms and methods developed are robust and advanced enough to be used in combination with a machine vision algorithm and automation system. …”
Get full text
Get full text
Article -
14
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
15
Tracking using normalized cross correlation and color space
Published 2007“…The aim of this paper is to describe the implementation a face tracking algorithm for video conferencing environment using the normalized cross correlation method. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Lane detection system for autonomous vehicle using image processing techniques
Published 2005“…A Radon peak detection algorithm was developed based on two values, Rand O. …”
Get full text
Get full text
Thesis -
17
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. The first and second proposed methods were incorporated into the proposed Background Pass-Go (BPG) system and Visual Identification Protocol Professional (VIP Pro) system respectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
