Search Results - (( points detection method algorithm ) OR ( software visualization using algorithm ))

Refine Results
  1. 1

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Distance computation between convex objects using axis-aligned bounding-box in virtual environment application by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…In this paper, we describes our current work of determining the precise contact by measuring the distance between near colliding objects in order to maintain the accuracy and improve the speed of collision detection algorithm. Common method determine the distance by checking for vertices and edges point between objects in brute force condition. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi by Razmi, Nursyafiqah

    Published 2018
    “…The thresholding algorithm was developed to detect the crack area and estimate the crack length by using MATLAB version 2015a and 2017a software. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm by Abd Rahman, Mohd Shahrizan, Jamaludin, Nor Azliana Akmal, Zainol, Zuraini, Tengku Sembok, Tengku Mohd

    Published 2025
    “…The methodologies employ strict checks based on the 14-point Defense Contract Management Agency (DCMA) schedule health framework to detect issues in the schedules at an early stage and maintain the integrity of the schedules. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The first algorithm locates interest points in food images using an MSER. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Besides, that the project introduces a robust method called trilateration algorithm. Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    The Development Of System For Algorithms Visualization Using Simjava by Jamil Alsayaydeh, Jamil Abedalrahim, Ahmad Idil, Abdul Rahman, Zainon, Maslan, Aziz, Azwan, Zikri Abadi, Baharudin, Oliinyk, Andrii

    Published 2020
    “…Algorithm visualization which is a form of high-level dynamic visualization of software that uses user interface techniques to portray and monitor the computational steps of algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Simulation and Visualization of TSP Using Ant Colony Optimization by Tri Basuki, Kurniawan, Misinem, ., Astried, ., Joan Angelina, Widians

    Published 2023
    “…This study aims to simulate and visualize the TSP by developing a software simulation model. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Artificial immune system based on real valued negative selection algorithms for anomaly detection by Khairi, Rihab Salah

    Published 2015
    “…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm by Abdel-Fatah, Farhan, Md Dahalin, Zulkhairi, Jusoh, Shaidah

    Published 2010
    “…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    The application of Hough Transform for corner detection by Jamaludin, Mohad Fuad

    Published 2006
    “…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The experimental test shows that the proposed method can generate the shortest path and best smooth trajectory from start to goal points in comparison with the laser simulator.…”
    Get full text
    Thesis