Search Results - (( using (vectorisation OR factorization) _ algorithm ) OR ( using detection method algorithm ))
Search alternatives:
-
1
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004“…The vectorisation software has been used for producing these data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
3
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
4
Wood texture detection with conjugate gradient neural network algorithm
Published 2017“…This project explored fundamental methods to find the factors that can be used in classifying and detecting the type of wood. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A Detection Method for Text Steganalysis Using Evolution Algorithm (EA) Approach
Published 2012“…Therefore, this research employed a detection factor based on the evolution algorithm method for text steganalysis. …”
Get full text
Get full text
Get full text
Thesis -
6
Multicolour object detection using multithreading
Published 2015“…As image and video processing applications are leaning towards real-time requirement, the program control for the system must be designed efficiently while taking the processing time factor as one of the main considerations. This paper presents the method of detecting multicolour objects and the processing time comparisons of designed algorithms. …”
Get full text
Get full text
Get full text
Proceeding Paper -
7
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
8
Drowsy driver detection using Viola-Jones Algorithm / Wan Nurul Adlina Wan Sallehuddin ... [et al.]
Published 2021“…Viola-Jones algorithm is used to detect driver’s face and eyes in real time. …”
Get full text
Get full text
Get full text
Article -
9
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…The present fault detection and diagnosis (FDD) method based on MSPC uses statistical control charts and contribution plots. …”
Get full text
Get full text
Monograph -
11
Pothole detection using UAV with deep learning algorithm for road inspection
Published 2024Get full text
Get full text
Conference or Workshop Item -
12
Intrusion Detection in Mobile Ad Hoc Networks Using Transductive Machine Learning Techniques
Published 2011“…The proposed algorithm employs a combined model that uses two different measures (nonconformity metric measures and Local Distance-based Outlier Factor (LDOF)) to improve its detection ability. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
15
Development of optimized damage prediction method for health monitoring of ultra high performance fiber-reinforced concrete communication tower
Published 2018“…The modal frequencies of the tower are evaluated under various conditions of damage in concrete and connection in different parts of the tower by using finite element simulation. The results are used to develop the hybrid learning algorithm based on the AdaBoost, Bagging, and RUSBoost methods to predict the damage in the tower based on dynamic frequency domain. …”
Get full text
Get full text
Thesis -
16
Integrated face detection approach for far image application
Published 2016“…The noise reduction method in the proposed algorithm consists of a combination of a morphological filter and a rejection method. …”
Get full text
Get full text
Thesis -
17
An accurate algorithm of PMU-based wide area measurements for fault detection using positive-sequence voltage and unwrapped dynamic angles
Published 2022“…An important differentiation of this work is that the proposed algorithm can coordinate with all phasor measurement units to accurately determine the faulty line using the index of unwrapped dynamic phase angles. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
A Systematic Review Of Machine Learning Algorithms For Mental Health Detection Using Social Media Data
Published 2026journal::journal article -
19
Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold
Published 2020“…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
Get full text
Get full text
Get full text
Article -
20
Algorithm of face recognition by principal component analysis
Published 2002“…A database of about 400 facial images was used to test the algorithm. Each image is represented by a matrix (112x 92). …”
Get full text
Get full text
Article
