Search Results - (( virtual detection method algorithm ) OR ( using optimization method algorithm ))
Search alternatives:
- virtual detection »
- method algorithm »
-
1
An ensemble feature selection method to detect web spam
Published 2018“…Web spam is an illegal method to increase mendacious rank of internet pages by deceiving the algorithms of search engines, so it is essential to use an efficient method. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Modeling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Undergraduates Project Papers -
4
Feature extraction and classification stage on facial expression : A review
Published 2022“…This review will compare two kinds of extract features methods and one classification method. The first technique of extracting features is the optimization technique using the K-Mean algorithm, which helps to increase recognition accuracy. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Efficient distance computation algorithm between nearly intersected objects using dynamic pivot point in virtual environment application
Published 2014Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Efficient distance computation algorithm between nearly intersect objects using dynamic pivot point in virtual environment application
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
-
8
Distance computation between convex objects using axis-aligned bounding-box in virtual environment application
Published 2013“…Performing collision detection between convex objects in virtual environment simulation is one of vital problems in computer visualization research area. …”
Get full text
Get full text
Conference or Workshop Item -
9
Balanced hierarchical method of collision detection in virtual environment
Published 2011“…In this paper, we introduced a splitting algorithm that is able to successfully divide the hierarchical construction in virtual environment. …”
Get full text
Get full text
Book Chapter -
10
Modified canny edge detection technique for identifying endpoints
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…Thus, in this paper we presented our novel algorithm for constructing Bounding-Volume Hierarchies using Quad Splitting method. …”
Get full text
Get full text
Article -
12
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…Slope variability model is an algorithm that is being used for detecting terrain roughness. …”
Get full text
Get full text
Thesis -
13
-
14
Application of genetic algorithm methods to optimize flowshop sequencing problem
Published 2008“…Genetic algorithm method was one of the methods that were widely used in solving optimization problem. …”
Get full text
Get full text
Undergraduates Project Papers -
15
LEVEL-BASED CORRESPONDENCE APPROACH TO COMPUTATIONAL STEREO
Published 2010“…Correspondence is the method of detecting the real world object reflections in two camera views. …”
Get full text
Get full text
Thesis -
16
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Later, an Iterative-based Sizing Algorithm (ISA) was developed to determine the optimal sizing solution which was later used as benchmark for sizing algorithms using optimization methods. …”
Get full text
Get full text
Thesis -
17
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
18
-
19
Vision-Based Hand Detection and Tracking Using Fusion of Kernelized Correlation Filter and Single-Shot Detection
Published 2023“…This study explores the use of deep learning techniques for fast and robust hand detection and tracking. A novel algorithm is proposed by combining the Kernelized Correlation Filter (KCF) tracker with the Single-Shot Detection (SSD) method. …”
Get full text
Get full text
Get full text
Article -
20
An early warning detection system of terrorism in indonesia from Twitter contents using naïve bayes algorithm
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item
