Search Results - (( using evaluation methods algorithm ) OR ( software visualization based algorithm ))

Refine Results
  1. 1

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Reversible Watermarking Based on Sorting Prediction Algorithm by Khalid, Edris, Jasni, Mohamad Zain, Tuty Asmawaty, Abdul Kadir

    Published 2015
    “…In this paper, we propose a reversible watermarking algorithm to improve Sachnev et al algorithm by using new sorting method. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Common benchmark functions for metaheuristic evaluation: a review by Hussain, Kashif, Mohd Salleh, Mohd Najib, Shi, Cheng, Naseem, Rashid

    Published 2017
    “…In literature, benchmark test functions have been used for evaluating performance of metaheuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Region duplication forgery detection technique based on keypoint matching / Diaa Mohammed Hassan Uliyan by Diaa , Mohammed Hassan Uliyan

    Published 2016
    “…The method is based on blur metric evaluation (BME) and phase congruency (PCy). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real time vein visualization using near-infrared imaging by May, Y. H., Ernawan, Ferda

    Published 2020
    “…OpenCV library is also used for its real-time functionalities. The functionality of the system is evaluated through a series of planned system tests. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Detecting and evaluating surface crack defect of building structure and infrastructure elements using Digital Image Processing approach / Nursyafiqah Razmi by Razmi, Nursyafiqah

    Published 2018
    “…The current surface crack detection and length assessment on the damaged structures using the visual inspection method is conducted using manual observation based on trained eye's building inspector. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Parallel system for abnormal cell growth prediction based on fast numerical simulation by Alias, Norma, Islam, Md. Rajibul, Shahir, Rosdiana, Hamzah, Norhafizah, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Ludin, Eliana, Azami, Masrin

    Published 2010
    “…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Development of a Spatiotemporal Data Model for Management and Visualization of Surface Movement Data by Mohd Rahim, Mohd Shafry

    Published 2008
    “…The retrieved data from the database system is saved in the proposed data format for surface movement visualization. In developing the visualization tool, visualization algorithm was used by employing the morphing technique which uses parametric equation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…All of these steps were conducted using Orange data mining software. Results: Based on the findings, neural network scored the highest overall accuracy of 98.6% after conducting filtering technique. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Measuring aircraft altimetry system error using automatic dependent surveillance-broadcast data / Kalyani Bahskaran by Kalyani , Bahskaran

    Published 2021
    “…A scatter graph is outputted displaying the FL, Datetime, and ASE values to visualize the ASE pattern and compliance throughout the flight duration. The algorithms’ accuracy is evaluated against the method adopted by China RMA comparing the Mean ASE values returned 98.84% accuracy using the same dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    3D imaging techniques in documentation of cultural assets in Malaysia by Md. Sharif, Harlina, Hazumi, Hazman, Saedin, Nurfarhanah

    Published 2015
    “…This paper presents an initial stage in an exploratory study that investigates the potentials of using CV automated image-based open- source software and web services to reconstruct and replicate cultural assets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    3D documenatation of the petalaindera: Digital heritage preservation methods using 3D laser scanner and photogrammetry by Md Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2018
    “…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    A novel method for vegetation encroachment monitoring of transmission lines using a single 2D camera by Ahmad, Junaid, Malik, Aamir Saeed, Abdullah, Mohd Faris, Kamel, Nidal S., Xia, Likun

    Published 2015
    “…A single camera mounted on power poles acquires images and sends them wirelessly to the base station. At base station, algorithm (software) trained by image processing and pattern recognition techniques is used to identify (height, depth, and width of encroached vegetation, etc.) …”
    Get full text
    Get full text
    Article
  20. 20

    3D documentation of the Petalaindera: digital heritage preservation methods using 3D laser scanner and photogrammetry by Md. Sharif, Harlina, Hazumi, Hazman, Meli, Rafiq Hafizuddin

    Published 2017
    “…This paper presents a completed stage of an exploratory study that investigates the potentials of using CV automated image-based open-source software and web services to reconstruct and replicate cultural assets. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper