Search Results - (( form detection based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…In the first part of the proposed algorithm, unique moments coefficients (features) are extracted using a new hybrid set of orthogonal polynomials which is derived based on the modified forms of Krawtchouk and a Tchebichef polynomials. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    GuitarApprentice: A Mobile Application for Acoustic Guitar Learning using Fast Fourier Transform algorithm by Lau , Jason Kim Wee

    Published 2013
    “…The application also aims to select the best algorithm to detect chords and display the chords detection in pictorial form for easier understanding. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The second procedure is based on eliminating the damage algorithm's values at the supports and this has been applied to the original form of the LSI. …”
    Get full text
    Get full text
    Article
  4. 4

    Landmark detection for vision based of autonomous guided vehicle by Nurul Atiqah Syazwani, Kamarudin

    Published 2012
    “…The algorithm is developed not only to detect and recognize but also to distinguish landmark from non-landmark. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach by Puriwat, Lertkrai

    Published 2012
    “…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…These moments (smoothed and gradients) are fused to form a feature vector. Finally, the support vector machine is utilized to detect hard transitions. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Performance analysis of coalition formation algorithms based on matching theory for cognitive radio networks by Tahir, Mohammad, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul

    Published 2017
    “…For the first algorithm for coalition formation, well-known gale shapely algorithm is used to achieve cooperation among the cognitive radios for spectrum detection and sharing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Algorithm of the longest commonly consecutive word for plagiarism detection in text based document by Sediyono, Agung, Ku-Mahamud, Ku Ruhana

    Published 2008
    “…Based on the experiment, the proposed algorithm outperforms the suffix tree in the length of observed paragraph below one hundred words.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…This algorithm can also work for big number of SUs that detect the OFDM signal. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…This paper proposes an intelligent algorithm using an adaptive neural- Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Improving test efficiency through multiple criteria coverage based test case prioritization using modified heuristic algorithm by Joseph, A.K., Radhamani, G., Kallimani, V.

    Published 2016
    “…The humongous set of test cases makes it redundant and cumbersome for the testers who ensure quality for an end application. The fault detection capability of a prioritized test suite is improved up to 15 using Modified PSO which forms the base algorithms for prioritization. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of a rule-based fault diagnostic advisory system for precut fractionation column by Heng, Han Yann

    Published 2005
    “…The advisory system algorithm used process history based method and presented by rule-based approach. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cluster detection for spatio-temporal dengue cases at Selangor districts using multi-EigenSpot algorithm by Nor, N.H.M., Daud, H., Ullah, S.

    Published 2022
    “…Different scope of clustering and geometric form of scanning window has significant contribution to the detected clusters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…This model is then embedded into the detection algorithm together with the inclusion of dynamic tweet-based features which are not as part of the features used to train a classification model for phishing tweet detection. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman, Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2017
    “…Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article