Search Results - (( points extraction process algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…The purpose of study is to extract the boundary of image, find the corner point and compare between two algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fingerprint classification : a BI-resolution approach to singular point extraction by Leong, Chung Ern

    Published 2004
    “…This thesis presents a singular point extraction method using two layers of information, without pre-processing of the image. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…In the task of individual tree extraction, the point cloud distance discriminant clustering algorithm outperformed the watershed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images by Boroujeni, Farsad Zamani, O. K. Rahmat, Rahmita Wirza, Mustapha, Norwati, Affendey, Lilly Suriani, Maskon, Oteh

    Published 2011
    “…Staring from reliable initial points, the algorithm efficiently extracts the centerline points along the initial direction until certain pre-defined criteria are satisfied. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm by Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2013
    “…Boost dc-dc converter is used with maximum power point tracking algorithm to operate at desired voltage level. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    Square groove detection based on forstner with canny edge operator using laser vision sensor by Mohammed Naji, Osamah Abdullah Ahmed

    Published 2023
    “…The objectives of 1his research are to develop a detection algorithm 1hat can extract 1he feature points of1he square-groove; and 1he second objective is to evaluate 1he detection algorithm and its ability to extract 1he image features of 1he square-groove in temis of 1he accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    ESTIMATION HUMAN HEIGHT FROM VIDEO CAMERA by HARLEY, EDWIN@JOHNNY

    Published 2019
    “…There are three steps for analysis human height algorithm measurements such as vanishing point, line extraction, and image processing technique that involved in my research of estimation of human height. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…Many maximum power point tracking (MPPT) algorithms were proposed in literature, such as conventional and soft computing algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali by Mohd Razali, Ainaa Farhanah

    Published 2022
    “…Although there are many feature identification and feature extraction procedures to identify and extract the features on the surfaces based on segmentation methods as presented in previous studies, problem arises when most of them are unable to fulfil the requirements when being implemented on a particular surface topography such as unable to point out at which exact data points the edges features are actually located. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Novel initialization strategy: Optimizing conventional algorithms for global maximum power point tracking by Al-Tawalbeh, Nedaa, Zafar, Muhammad Hamza, Mohd Radzi, Mohd Amran, Mohd Zainuri, Muhammad Ammirrul Atiqi, Al-Wesabi, Ibrahim

    Published 2024
    “…In this research, a novel initialization strategy for conventional MPPT algorithms is proposed to define the best position for the tracking process to start over the P–V curve. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…A metrics to select the best representation of vessel cross section is incorporated with tracking direction estimation throughout the centerline extraction process. The centerline extraction requires predefined root seed (ostia) for each coronary artery tree. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…In this project, Support Vector Machines (SVM) is studied and experimented by the implementation ofa textual extractor. This algorithm is used to extract important points from a lengthy document, by which it classifies each word in the document under its relevant category and constructs the structure of the summary with reference to the categorized words. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…In this project, Support Vector Machines (SVM) is studied and experimented by the implementation ofa textual extractor. This algorithm is used to extract important points from a lengthy document, by which it classifies each word in the document under its relevant category and constructs the structure of the summary with reference to the categorized words. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…A reversing technique is proposed in order to detect true end point in the fingerprint image. A post-processing technique is also added to minutiae extraction process to determine the true minutiae. …”
    Get full text
    Get full text
    Thesis
  19. 19

    An Ar Natural Marker Similarities Measurement Algorithm For E-Biodiversity by Tan, Mei Synn, Wang, Yin Chai

    Published 2018
    “…Algorithms of investigation starting with span from extraction, matching and classification to determine the interest point of flower species, like colour and shape features information. …”
    Get full text
    Get full text
    Proceeding
  20. 20

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Region of interest (ROI) of a fingerprint image is extracted by using a modified blob analysis method, and then the core point of the ROI is detected for dimension reduction process. …”
    Get full text
    Get full text
    Get full text
    Article