Search Results - (( using estimation method algorithm ) OR ( software detection method algorithm ))
Search alternatives:
- software detection »
- estimation method »
- using estimation »
- method algorithm »
-
1
A lower complexity k best algorithm for multiple input and multiple output detection
Published 2011“…This paper presents Multiple Input Multiple Output (MIMO) detection steps using tree search based method known as the ‘K’ best algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Vehicle detection for vision-based intelligent transportation systems using convolutional neural network algorithm
Published 2022“…Hardware-based solutions such as radars and LIDAR are been proposed but are too expensive to be maintained and produce little valuable information to human operators at traffic monitoring systems. Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. )erefore, the paper will review and evaluate different vehicle detection methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…In contrast to the conventional methods which perform detection from a single image, the stenosis detection algorithm using two images from various view angles to avoid false positive (stenosis overestimated) and false negative (stenosis underestimated). …”
Get full text
Get full text
Thesis -
4
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The adopted reduced rank technique is based on singular value decomposition algorithm. Equations for reduced rank-joint channel estimation (JCE) are derived and compared against traditional full rank-joint channel estimators: least square (LS) or Steiner, enhanced LS, and minimum mean square error algorithms. …”
Get full text
Get full text
Article -
5
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
Get full text
Get full text
Thesis -
6
Integration of image processing algorithm and deep learning approaches to monitor ginger plant
Published 2024“…The deep learning algorithm will undergo training using a dataset containing ginger plant images, which will allow it to accurately identify and categorize various stages of growth. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The average detection rate of our algorithm maintained 96 % true positive rate and 7 % false positive rate which outperform several current detection methods. …”
Get full text
Get full text
Thesis -
8
Automated & innovative surface crack detection & length estimation technique for infrastructure inspection work / Syahrul Fithry Senin ... [et al.]
Published 2019“…The thresholding algorithm was developed for the purpose of image processing using the MATLAB software. …”
Get full text
Get full text
Book Section -
9
Investigation of block matching algorithm for video coding
Published 2013“…Then, the best BMA algorithm technique will be chosen to develop a hybrid method that varies with the motion type of the video. …”
Get full text
Get full text
Get full text
Thesis -
10
ESTIMATION HUMAN HEIGHT FROM VIDEO CAMERA
Published 2019“…This paper presents about estimation of human height with video camera. There have been many methods that developed to measure accuracy of human height algorithm with image processing techniques in computer such as non-contact measurement, RGB-Camera, calibrated camera and etc but some of this technique have weakness of the can be detected such as errors. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Hybrid sampling and random forest machine learning approach for software detect prediction
Published 2019“…Cross validation is used to remove overriding problem. Scikit-learn library is used for machine learning algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…The thresholding algorithm was developed to detect the crack area and estimate the crack length by using MATLAB version 2015a and 2017a software. …”
Get full text
Get full text
Student Project -
13
Capture and estimate the speed of the object for remote monitoring / Nor Sajidah Ab Ghani
Published 2016“…The optical flow used Kanade Lucas Algorithm method to track the vehicle movement in the video. …”
Get full text
Get full text
Thesis -
14
Malay festive seasons food recognition for calorie detection / Nurul Hafiza Basiruddin
Published 2021“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification which is the part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Thesis -
15
Image Stitching Of Aerial Footage
Published 2021“…The images are warped to the key frame of the footage to generate a stitched image by using the computed homography. The algorithm performance is evaluated using the Orchard datasets, consisting of L-shape flight pattern and lawnmower flight pattern. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
Published 2008“…Active steganalysis is presented as ways to expose the possibility of detecting existence of hidden messages, hence defeating steganography. Estimating some parameters of embedding algorithm is the approach that the study used since secret message is one of its essential parameters. …”
Get full text
Get full text
Get full text
Thesis -
17
Malay festive seasons food recognition for calorie detection using SVM and ECOC approaches / Nurul Hafiza Binti Basiruddin, Zalikha Zulkifli and Samsiah Ahmad
Published 2022“…Then the result from the Color Feature Extraction Method is used to identify the type of food by using Error-Correcting Output Codes (ECOC) classification, which is part of the Support Vector Machine (SVM) algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…A model to estimate the levels of risk of spam accounts is established using Fuzzy Analytic Hierarchy Process. …”
Get full text
Get full text
Get full text
Thesis -
19
Pothole detection using multispectral sensor and unmanned aerial vehicle imagery / Muhammad Hafiz Aizuddin Mohd Zaidi
Published 2024“…The study has three objectives: to evaluate the accuracy of 3D pothole estimations from UAV images compared to actual pothole data, to investigate the impact of multispectral band combinations on pothole edge detection, and to assess different algorithms for pothole area extraction using multispectral and visible images. …”
Get full text
Get full text
Thesis -
20
Camera geometry determination based on circular's shape for peg-in-hole task
Published 2019“…The performance of the proposed system is analyzed based on detection rate analysis. This project is developed by using MATLAB software. …”
Get full text
Get full text
Thesis
