Search Results - (( points detection method algorithm ) OR ( software visualization using algorithm ))
Search alternatives:
- points detection »
- method algorithm »
- using algorithm »
-
1
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
2
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
3
Distance computation between convex objects using axis-aligned bounding-box in virtual environment application
Published 2013“…In this paper, we describes our current work of determining the precise contact by measuring the distance between near colliding objects in order to maintain the accuracy and improve the speed of collision detection algorithm. Common method determine the distance by checking for vertices and edges point between objects in brute force condition. …”
Get full text
Get full text
Conference or Workshop Item -
4
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…The thresholding algorithm was developed to detect the crack area and estimate the crack length by using MATLAB version 2015a and 2017a software. …”
Get full text
Get full text
Student Project -
5
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The methodologies employ strict checks based on the 14-point Defense Contract Management Agency (DCMA) schedule health framework to detect issues in the schedules at an early stage and maintain the integrity of the schedules. …”
Get full text
Get full text
Get full text
Article -
6
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
8
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
9
Rogue access point detection and tracking system using trilateration algorithm
Published 2023“…Besides, that the project introduces a robust method called trilateration algorithm. Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
Get full text
Get full text
Book Section -
10
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Interestingly, the experimental results under different irradiances also show that the proposed algorithm can detect the GMPP faster in comparison with other methods. …”
Get full text
Get full text
Thesis -
11
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithm visualization which is a form of high-level dynamic visualization of software that uses user interface techniques to portray and monitor the computational steps of algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
Get full text
Get full text
Thesis -
14
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…This study aims to simulate and visualize the TSP by developing a software simulation model. …”
Get full text
Get full text
Get full text
Article -
15
Feature Selection and Classifier Parameter Estimation for Egg Signal Peak Detection using Gravitational Search Algorithm
Published 2014“…This study focuses on using GSA method, a new computational intelligence algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
17
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…The Real-Valued Negative Selection Algorithms, which are the focal point of this research, generate their detector sets based on the points of self data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Dynamic intrusion detection method for mobile ad hoc network using CPDOD algorithm
Published 2010“…In this paper, we propose a novel intrusion detection method by combining two anomaly methods Conformal Predictor k-nearest neighbor and Distancebased Outlier Detection (CPDOD) algorithm. …”
Get full text
Get full text
Get full text
Article -
19
The application of Hough Transform for corner detection
Published 2006“…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
Get full text
Get full text
Thesis -
20
A generalized laser simulator algorithm for optimal path planning in constraints environment
Published 2022“…The experimental test shows that the proposed method can generate the shortest path and best smooth trajectory from start to goal points in comparison with the laser simulator.…”
Get full text
Thesis
