Search Results - (( developing perception selection algorithm ) OR ( java implication force algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…This thesis will present the design, development and analysis of performance on a developed Double Stage Filter (DSF) algorithm and other existing stereo matching algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Dual vector control strategy for a three-stage hybrid cascaded multilevel inverter by Kadir, M.N.A., Mekhilef, Saad, Ping, H.W.

    Published 2010
    “…This paper presents a voltage control algorithm for a hybrid multilevel inverter based on a staged-perception of the inverter voltage vector diagram. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…Therefore, accurate risk perception has become vital. This research aims to develop models for objectively assessing perceived risk. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Auto raise hand in Microsoft teams (API/Extension) by Teh, Boon Hin

    Published 2023
    “…Artificial Intelligence focuses on developing intelligences of machines, by developing algorithms, machines are able to learn from data and patterns, even perform tasks that require human intelligence, such as visual perception, speech recognition, and decision-making. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli by Ramli, Muhammad Izzad

    Published 2018
    “…Consequently, new rules and algorithm that is MustFront rule, limitation rule, and two-steps pitch contour algorithm are introduced to increase the synthesized speech quality. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    The relationships between brand attributes and word of mouth on brand identity and brand image by Al Kasassbh, Hazem Mohamad Abd Al Ghany

    Published 2017
    “…A cross-sectional survey approach and the quota sampling technique were adopted to select the participants, and PLS algorithm and bootstrapping techniques were deployed to test the hypothesized relationships. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…Despite worldwide rapid development in 3D imaging technologies, documentation of 3D cultural assets in Malaysia is still very much reliant upon conventional techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…This means that any changes on the cover media (c) could lead to the identification of the stego media (s), which contains the secret message (m). Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17