Search Results - (( using evaluation method algorithm ) OR ( software visualization based algorithm ))
Search alternatives:
- visualization based »
- evaluation method »
- using evaluation »
- method algorithm »
-
1
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
Get full text
Get full text
Thesis -
2
Reversible Watermarking Based on Sorting Prediction Algorithm
Published 2015“…In this paper, we propose a reversible watermarking algorithm to improve Sachnev et al algorithm by using new sorting method. …”
Get full text
Get full text
Get full text
Article -
3
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Common benchmark functions for metaheuristic evaluation: a review
Published 2017“…In literature, benchmark test functions have been used for evaluating performance of metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Article -
5
Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms
Published 2024“…The classification algorithm used in this research is the Convolutional Neural Network (CNN) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The software used for this prototype is Visual Basic 6.0. …”
Get full text
Get full text
Research Reports -
7
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The software used for this prototype is Visual Basic6.0. …”
Get full text
Get full text
Research Reports -
8
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022“…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan
Published 2016“…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
Get full text
Get full text
Thesis -
10
Real time vein visualization using near-infrared imaging
Published 2020“…OpenCV library is also used for its real-time functionalities. The functionality of the system is evaluated through a series of planned system tests. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi
Published 2018“…The current surface crack detection and length assessment on the damaged structures using the visual inspection method is conducted using manual observation based on trained eye's building inspector. …”
Get full text
Get full text
Student Project -
12
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data
Published 2008“…The retrieved data from the database system is saved in the proposed data format for surface movement visualization. In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
Get full text
Get full text
Thesis -
14
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…All of these steps were conducted using Orange data mining software. Results: Based on the findings, neural network scored the highest overall accuracy of 98.6% after conducting filtering technique. …”
Get full text
Get full text
Get full text
Article -
16
Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran
Published 2021“…A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. The algorithms’ accuracy is evaluated against the method adopted by China RMA comparing the Mean ASE values returned 98.84% accuracy using the same dataset. …”
Get full text
Get full text
Get full text
Thesis -
17
3D imaging techniques in documentation of cultural assets in Malaysia
Published 2015“…This paper presents an initial stage in an exploratory study that investigates the potentials of using CV automated image-based open- source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2018“…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
A novel method for vegetation encroachment monitoring of transmission lines using a single 2D camera
Published 2015“…A single camera mounted on power poles acquires images and sends them wirelessly to the base station. At base station, algorithm (software) trained by image processing and pattern recognition techniques is used to identify (height, depth, and width of encroached vegetation, etc.) …”
Get full text
Get full text
Article -
20
3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry
Published 2017“…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
