Search Results - (( using detection method algorithm ) OR ( using visualization techniques algorithm ))
Search alternatives:
- visualization techniques »
- method algorithm »
- using detection »
-
1
Cabbage disease detection system using k-NN algorithm
Published 2022“…The image sample pixel will need to convert first using an otsu method and histogram method in the image processing and segmentation technique. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…In the third algorithm, a soft assignment technique using fuzzy encoding is used to transform low-level features into a higher-level feature representation. …”
Get full text
Get full text
Thesis -
3
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
4
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
5
A cascading fuzzy logic with image processing algorithm-based defect detection for automatic visual inspection of industrial cylindrical object’s surface
Published 2018“…This paper proposes a cascading fuzzy logic algorithm with image processing technique for defect detection and classification on the lateral surface of industrial cylindrical object using a camera and multiple flat mirrors. …”
Get full text
Get full text
Get full text
Article -
6
Innovative algorithm for easing VIP's navigation by avoiding obstacles and finding safe routes
Published 2023Conference Paper -
7
Damage visualization based on frequency shift of single-mode ultrasound-guided wavefield
Published 2022“…Overall, the results show that frequency analysis can detect the damage four times faster and the algorithm uses two-dimensional calculation instead of conventional three-dimensional of VTWAM method.…”
Get full text
Get full text
Article -
8
Parallel visualization approach of a 3D heart model
Published 2008“…With this knowledge, we propose improvement to the existing deterministic algorithm. An algorithm for detection of and dealing with the aliasing problem is also suggested Test results show that our proposed combinational deterministic method and the anti aliasing technique improves the system performance by up to 33% compared to other deterministic method using single scalar values.…”
Get full text
Get full text
Conference or Workshop Item -
9
Cars detection in stitched image using morphological approach
Published 2017“…The method is improved by using algorithm which removes noise by sizes. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
11
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
12
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
13
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
14
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
15
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
16
A Systematic Review of Anomaly Detection within High Dimensional and Multivariate Data
Published 2023“…Moreover, a comparison of each algorithm for anomaly detection is also provided to produce a better algorithm. …”
Get full text
Get full text
Article -
17
Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal
Published 2018“…Electrocardiogram (ECG) is one of the medical techniques employed to monitor heart performance and used for the detection of different arrhythmias. …”
Get full text
Get full text
Conference or Workshop Item -
18
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…It is hypothesized that the ABR to LS CE Chirp combined with a high stimulus repetition rate and the objective algorithm will have a shorter test-time, larger amplitudes, and lower ABR threshold than the ABR to click stimulus, low stimulus repetition rate and wave identification using visual detection. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Subspace Techniques for Brain Signal Enhancement
Published 2009“…Next, the validity and the effectiveness of the algorithms to detect the P100's (used in objective assessment of visual pathways) are evaluated using real patient data collected from a hospital. …”
Get full text
Get full text
Book Section -
20
Detection of defect in concrete using elastic wave tomography reconstruction technique / Liu Kit Fook
Published 2017“…The tomography technique is one of the NDE methods that evaluate soundness of concrete structures by providing visualization to its interior. …”
Get full text
Get full text
Thesis
