Search Results - (( java application customization algorithm ) OR ( construct detection method algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- method algorithm »
-
1
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
Get full text
Get full text
Thesis -
2
A study on channel coding for 5G / Xu Wei
Published 2019“…In addition, the performances of Polar code under different decoding algorithms and different construction method are simulated and compared. …”
Get full text
Get full text
Get full text
Thesis -
3
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…In this paper, we propose an efficient steganography algorithm which applies edge detection and MPC algorithm for data concealment in digital images. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Balanced hierarchical method of collision detection in virtual environment
Published 2011“…By enhancing the capabilities of splitting rules of Bounding-Volume Hierarchies (BVH), the construction of BVH is improved and is able to provide fast collision detection method between two successive configurations.…”
Get full text
Get full text
Book Chapter -
5
-
6
Comparison of UAV flying height parameter for crack detection applications / Wan Nurdayini Batrisyia Wan Ghazali
Published 2024“…Conventional methods of inspection of constructions are time-consuming, require much labor, and make people stand in hazardous conditions. …”
Get full text
Get full text
Student Project -
7
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…This model driven approach was integrated with the proposed infeasible path detection method which based on analyzing various OCL constructs and operations. …”
Get full text
Get full text
Get full text
Thesis -
8
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…Thus, in this paper we presented our novel algorithm for constructing Bounding-Volume Hierarchies using Quad Splitting method. …”
Get full text
Get full text
Article -
9
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Defects identification on semiconductor wafer for yield improvement using machine learning / Pedram Tabatabaeemoshiri
Published 2025“…The algorithm showed consistent performance across different wafer types and test configurations, outperforming traditional detection methods with improved computational efficiency. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…This work demonstrated artificial sine signal constructed using Matlab software in order to identify the effectiveness and accuracy of this method. …”
Get full text
Get full text
Article -
13
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…This work demonstrated artificial sine signal constructed using Matlab software in order to identify the effectiveness and accuracy of this method. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A real time road marking detection system on large variability road images database
Published 2017“…One of the first embedded system is a lane detection system, which was implemented using road marking detection algorithms with the aim to produce a system that is able to detect various shapes of road markings on the images that are captured under various imaging conditions. …”
Get full text
Get full text
Conference or Workshop Item -
16
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…First, the grid mapping of the robot's workspace environment is constructed, and then the borders of the workspace environment are detected based on the new proposed function. …”
Get full text
Thesis -
17
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
18
Approach for detecting lane line boundaries / Mamadou Baldeh
Published 2020“…In this paper, previous vision based lane detection studies are reviewed in terms of three aspects, which are lane detection algorithms, integration, and evaluation methods. …”
Get full text
Get full text
Thesis -
19
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
Published 2023“…This paper proposes a novel intelligent DDoS attack detection model based on a Decision Tee (DT) algorithm and an enhanced Gini index feature selection method. …”
Get full text
Get full text
Article -
20
Fault Detection and Isolation for Complex System
Published 2017“…The aim of the research is to construct and design a Fault Detection and Isolation algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
