Search Results - (( points detection method algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- points detection »
- method algorithm »
- java application »
-
1
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
3
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
5
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
6
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
7
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
9
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
11
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
12
The application of Hough Transform for corner detection
Published 2006“…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
Get full text
Get full text
Thesis -
13
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The experimental test shows that the proposed method can generate the shortest path and best smooth trajectory from start to goal points in comparison with the laser simulator.…”
Get full text
Thesis -
14
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Even though, Wse minutiae still detected during the process. Based on these errors, an improved Ridge Line Following Algorithm has developed which consist of five processes; tangent direction computation, sectioning and maximum determination, end point detection, bifurcation point detection, and post-processing. …”
Get full text
Get full text
Thesis -
15
Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images
Published 2011“…This paper presents a new method for efficient selection of initial points for exploratory tracing algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
Get full text
Get full text
Thesis -
17
Square groove detection based on Förstner with canny edge operator using laser vision sensor
Published 2023“…The extraction of the square groove’s feature points using a new method is presented in this paper. …”
Get full text
Get full text
Get full text
Article -
18
Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim
Published 2018“…Then, the image was being processed in the photogrammetry software to produce the orthomosaic and point cloud data. These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
Get full text
Get full text
Thesis -
19
Document image skew detection and correction method based on extreme points
Published 2014“…The experimental results show the high performance of the algorithm in detecting the angle of skew for a variety of documents with different levels of complexity. …”
Get full text
Get full text
Conference or Workshop Item -
20
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…The simulation results indicate that the proposed method is suitable to detect a single outlier. As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis
