Search Results - (( java implication based algorithm ) OR ( using content mapping algorithm ))

Refine Results
  1. 1

    Resource Minimization in a Real-time Depth-map Processing System on FPGA by Ngo, Huy Tan, Hamid, Nor Hisham, Sebastian , Patrick, Yap, Vooi Voon

    Published 2011
    “…Depth-map algorithm allows camera system to estimate depth. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA by NGO , NGO HUY TAN

    Published 2011
    “…Depth-map algorithm allows camera system to estimate depth in many applications. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Towards a multispectral imaging system for spatial mapping of chemical composition in fresh-cut pineapple (Ananas comosus) by Mollazade, Kaveh, Hashim, Norhashila, Zude-Sasse, Manuela

    Published 2023
    “…In this paper, a multispectral imaging-based approach is introduced to provide distribution maps of moisture content, soluble solids content, and carotenoids content in fresh-cut pineapple. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Then, the mapping percentages between the predefined and produced clusters are used to assess the performance of the proposed algorithm. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The Zernike moments and Sobel edge map are used as watermarks to provide malicious attack classification and locating tampered area. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Then, the mapping percentages between the predefined and produced clusters are used to assess the performance of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Surface and Near-surface Moisture Content Assessment using Multi-Temporal Satellite Images over Perak Tengah and Manjung Regions, Malaysia by A. Hassaballa , Abdalhaleem, Matori , Abdul Nasir, M. Shafri, Helmi Z.

    Published 2013
    “…Secondly, a success rate curve based on spatiostatistical technique was used for validating the generalized maps in order to study the high-low distribution of θ within NOAA and MODIS generalized maps. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…In this work, the LSI method is used to produce the patterns of terms, so that documents can be mapped into concept space. …”
    Get full text
    Get full text
    Thesis
  17. 17

    UNSUPERVISED SEGMENTATION OF CORAL REEF IMAGES BY USING COLOR AND TEXTURE FEATURES by MOHAMMAD SAMEER ALOUN

    Published 2022
    “…The unsupervised segmentation of color-texture regions using J-value segmentation (JSEG) algorithm is one of the most popular and robust unsupervised segmentation algorithms. …”
    Get full text
    Thesis
  18. 18

    Delineating mangrove forest zone using spectral reflectance by Abdul Whab @ Abdul Wahab,, Zulfa

    Published 2020
    “…Species identification with spectral library derived from in-situ measurements using SID algorithm and derived from Landsat 8 using SAM algorithm was done. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system by Irene Lim Jin Ying, Arif Mandangan

    Published 2024
    “…In this study, two chaotic maps, 3D Lorenz Map and 3D Chen system, are applied to generate random cryptographic keys for encrypting color images using permutation and diffusion mechanisms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20