Search Results - (( using function based algorithm ) OR ( basic detection a algorithm ))
Search alternatives:
- basic detection »
- using function »
- detection a »
- a algorithm »
-
1
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…This improved algorithm, known as the edge-template Contour Delineation (etCD), is based on the fusion of edge detection with corner-template detection and dynamic thresholding to produce enhanced edge map. …”
Get full text
Get full text
Thesis -
2
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
4
Stereo vision for visual object tracking and distance measurement assessment / Sukarnur Che Abdulla...[et al.]
Published 2019“…Furthermore, the project proposes a new program algorithm for binocular vision system to work, in order to identify distance of an object with a basic equation has been derived and set in the designed algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach
Published 2010“…Developing such a model from basic laws is a complicated and time consuming task. …”
Get full text
Conference or Workshop Item -
6
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Among many techniques of spectrum sensing, the Multi-resolution Spectrum Sensing (MRSS) is a popular technique in recent literature. Various multi resolution techniques are used that include wavelet based spectrum estimation and spectral hole detection, wavelet based multi-resolution in analog domain and multi-resolution multiple antenna based detection. …”
Get full text
Get full text
Thesis -
7
Rough Neural Networks Architecture For Improving Generalization In Pattern Recognition
Published 2004“…A novel feature extraction algorithm was developed to extract the feature vectors. …”
Get full text
Get full text
Thesis -
8
Google the earth: what's next?
Published 2010“…Through remote sensing, our basic scientific knowledge of the Earth and how it functions has expanded rapidly in the last few decades. …”
Get full text
Get full text
Get full text
Inaugural Lecture -
9
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
10
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…To this effect, a novel skin segmentation algorithm using artificial neural network (ANN) technique was developed and this was deployed to segment the palmprint and face images from the background. …”
Get full text
Get full text
Get full text
Monograph -
11
Robust Kernel Density Function Estimation
Published 2010“…The basic idea of RKWF based method is to first define a function which measures the outlying distance of observation. …”
Get full text
Get full text
Thesis -
12
Design and development of single-axis solar tracking system and water level control for application of line focus concentrator for solar desalination process
Published 2017“…The tracking algorithm determines the angles which are used to determine the position of solar tracker. …”
Get full text
Get full text
Undergraduates Project Papers -
13
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…For accurate simulation of manufacturing systems and processes in virtual environment, physical interaction with the objects in the scene are triggered by collision detection. This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
14
Solving power system state estimation using orthogonal decomposition algorithm / Tey Siew Kian
Published 2009“…This optimal state estimate and corrected data base are then used by the security monitoring and operation and control functions of the center.Most state estimation programs in practical use are formulated as overdetermined systems (Pozrikidis, 2008) of nonlinear equations and solved as weighted least square problems (refer to section 2.1.1).This research involves finding the least squares solution of the power system state estimation problem, HTR-1HDx = HTR-1 [z - f (x)] (refer to section 2.3.1) and to develop a program to implement the said algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
15
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005Get full text
Get full text
Final Year Project -
16
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
17
A detector generating algorithm for intrusion detection inspired by artificial immune system
Published 2015“…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
Get full text
Get full text
Get full text
Article -
18
Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin
Published 2019“…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
Get full text
Get full text
Thesis -
19
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…Outlier detection in linear data sets has been done vigorously but only a small amount of work has been done for outlier detection in circular data. …”
Get full text
Get full text
Get full text
Article -
20
Shot boundary detection based on orthogonal polynomial
Published 2019“…Shot boundary detection (SBD) is a substantial step in video content analysis, indexing, retrieval, and summarization. …”
Get full text
Get full text
Get full text
Article
