Search Results - (( points detection method algorithm ) OR ( data visualization using algorithm ))

Refine Results
  1. 1

    Data mining based damage identification using imperialist competitive algorithm and artificial neural network by Gordan, Meisam, Razak, Hashim Abdul, Ismail, Zubaidah, Ghaedi, Khaled

    Published 2018
    “…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
    Get full text
    Get full text
    Article
  2. 2

    Spectral texture segmentation of Magnetic Resonance Imaging (MRI) brain images for glioma brain tumour detection / Rosniza Roslan by Roslan, Rosniza

    Published 2013
    “…A new double thresholding algorithm and a fully automated multiple seed points selection algorithm that works on all three MRI image sequences are also proposed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    G2 parametric curve and surface fitting using beta-spline / Normi Abdul Hadi by Abdul Hadi, Normi

    Published 2015
    “…The data points are first segmented in comer detection process, then the curve control points are calculated based on the comer points. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The methodologies employ strict checks based on the 14-point Defense Contract Management Agency (DCMA) schedule health framework to detect issues in the schedules at an early stage and maintain the integrity of the schedules. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Internal defect detection and reconstruction framework for laminated glass fibre reinforced polymer composite materials by Ng, Sok Choo

    Published 2013
    “…It is found out that the proposed entropy-based k-nearest neighbour classification method has shown promising performance with 94.0 1% accuracy in close-spaced defects detection when minimal k-nearest neighbor is used. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Improved robust estimator and clustering procedures for multivariate outliers detection by Sharifah Sakinah, Syed Abd Mutalib

    Published 2023
    “…One of the methods to detect outliers in multivariate data is by using distance-based methods, which is Mahalanobis distance (MD). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mathematical modeling of brain tumor cell growth for passive, active and oxygen transport mechanism with microgravity condition / Norfarizan Mohd Said by Mohd Said, Norfarizan

    Published 2018
    “…The sequential algorithms for these methods are developed and written in Matlab R2009a code to produce the numerical simulations of the models. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Besides, that the project introduces a robust method called trilateration algorithm. Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
    Get full text
    Get full text
    Book Section
  12. 12

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of river water level estimation from surveillance cameras for flood monitoring system using deep learning techniques by Muhadi, Nur 'Atirah

    Published 2022
    “…The findings demonstrated that these methods are handcrafted and the algorithms need to be changed when applying to different images, which is not practical to be used during flood disasters. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
    Get full text
    Get full text
    Thesis