Search Results - (( process transformation method algorithm ) OR ( java application reoptimize algorithm ))
Search alternatives:
- process transformation »
- application reoptimize »
- method algorithm »
- java application »
-
1
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
Published 2019“…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. …”
Get full text
Get full text
Thesis -
2
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
Get full text
Get full text
Thesis -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Parallel processing and matrix convolution inside wavelet transform process is the most prominent study in this research. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
5
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…The objective evaluation steps show that the new method of enhancement not only superior to the commonly used transformation method (e.g. wavelet transform) but also to various spatial models (e.g. …”
Get full text
Get full text
Thesis -
6
Evaluation of sparsifying algorithms for speech signals
Published 2012“…Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) will be compared and evaluated based on Gini Index. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
P300 detection of brain signals using a combination of wavelet transform techniques
Published 2012“…In this research the BCI competition data-set has been processed through 5 optimized detection methods. Wavelet transform (WT), student’s two-sample t-statistic (T-Test) and support vector machines (SVM) used in designing the algorithms. …”
Get full text
Get full text
Thesis -
8
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…The genetic algorithms is proven to be a very effective method in optimization by using the way imitating natural process of living beings such as crossover, mutation and selection. …”
Get full text
Get full text
Thesis -
9
Pre-processing methods for vehicle lane detection / Muhammad Naim Mazani ... [et al.]
Published 2020“…Standard image processing methods are not suitable for complicated roads with various sign on the ground. …”
Get full text
Get full text
Get full text
Article -
10
Investigation of Meta-heuristics Algorithms in ANN Streamflow Forecasting
Published 2024“…This study investigated the efficacy of a hybrid model that adopted a meta-heuristic algorithm (MHA) as an optimizer to extend the training ANN method, from a gradient-based to a stochastic population-based approach for streamflow forecasting. …”
Article -
11
-
12
Local Stereo Matching Algorithm Using Small-Color Census Spared Adaptive Support Weight
Published 2011“…This work is still on process, to test the algorithm; it will use the Middlebury benchmark. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
Get full text
Get full text
Thesis -
14
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Published 2019“…The proposed algorithm can process more than 200 camera viewpoints within two seconds.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
Improved stereo matching algorithm based on census transform and dynamic histogram cost computation
Published 2021“…This new taxonomy improves the local method of stereo matching algorithm based on the dynamic cost computation for disparity map measurement. …”
Get full text
Get full text
Get full text
Article -
16
Development of a new algorithm for segmentation of flotation froth images
Published 2014“…Froth segmentation is a useful procedure that can determine the bubble size distribution. Several algorithms have been proposed in this field, but marker-based watershed transform shows the best performance. …”
Get full text
Get full text
Article -
17
Process monitoring and fault detection in nonlinear chemical process based on multi-scale Kernel Fisher discriminant analysis
Published 2015“…In this paper, a discrete wavelet transform (DWT) is applied to extract the dynamics of the process at different scales. …”
Get full text
Get full text
Conference or Workshop Item -
18
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The proposed method have adopted statistical region merging (SRM) algorithm to detect small regions, and then Harris interest points are localized in angular radial partition (ARP) of a circular region which are invariant to rotation and scale transformations. …”
Get full text
Get full text
Thesis -
19
A proposed genetic algorithm to optimize service restoration in electrical networks with respect to the probability of transformers failure
Published 2010“…Expected results of this new algorithm should lead to a new plan of restoration in permissible ranges of transformer loading in respect of their age, previous experienced faults and condition monitoring.…”
Get full text
Get full text
Conference or Workshop Item -
20
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. Lastly, this method can reduce a high false positive alarm rate and misclassification for detecting process.…”
Get full text
Get full text
Thesis
