Search Results - (( visualization _ prevention algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- prevention algorithm »
- java application »
-
1
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Building a feature-space for visual surveillance
Published 2014“…Visual surveillance applications play essential roles as a tool for archiving and to some extend preventing criminal activities. …”
Get full text
Get full text
Conference or Workshop Item -
4
A Multidimensional Search Space Using Interactive Genetic Algorithm
Published 2010“…This paper applied an Interactive Genetic Algorithm (IGA) technique to design an visualization environment for search space. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
-
7
Development of a new algorithm for segmentation of flotation froth images
Published 2014“…In the paper, the marker-based watershed method is modified to prevent oversegmentation of large bubbles. The developed algorithm is validated using some froth images captured at different operating conditions, so the results indicate that the method can segment the mixture of big and small bubbles effectively.…”
Get full text
Get full text
Article -
8
Predictive Analytics of the Likelihood Of Road Accidents by Location
Published 2019“…The dashboard will also contain at least one visual that gives the statistic of the likelihood of future accident to happen by location which its algorithm will be coded in R programming and be embedded into the main dashboard. …”
Get full text
Get full text
Final Year Project -
9
Development of visual odometry based machinery motion assessment system / Low Shee Teng
Published 2022“…Method 3 would be combining Method 2 with linear based EVM, and Method 4 would be purely linear based EVM. These algorithms are implemented in terms of their computational complexity and visual quality as well as how they provide the amplified motion of video output. …”
Get full text
Get full text
Get full text
Thesis -
10
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…Development of secured ECG signal is essential to protect patients’ confidentially and to prevent mistreatment. The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. …”
Get full text
Get full text
Article -
11
A BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM
Published 2010“…Researchers have developed many algorithms to solve the problem of object recognition that are machine vision motivated. …”
Get full text
Get full text
Thesis -
12
BIOLOGICALLY INSPIRED OBJECT RECOGNITION SYSTEM
Published 2010“…Researchers have developed many algorithms to solve the problem of object recognition that are machine vision motivated. …”
Get full text
Get full text
Thesis -
13
Dual Image Watermarking Based On Human Visual Characteristics For Authentication And Copyright Protection
Published 2023“…The objective of this proposed scheme is to develop an enhanced watermarking algorithm that achieves high imperceptibility and robustness by leveraging the principles of human visual system characteristics. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias
Published 2023“…By harnessing natural language processing techniques and data visualization tools, the project seeks to provide user-friendly solution for early detection and prevention of suicidal intentions expressed on social media. …”
Get full text
Get full text
Thesis -
15
Development of auto-tracking mobile robot
Published 2018“…Besides that, this algorithm also prevents tracking loss due to object color appears in the background.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Automatic control of flotation process using computer vision
Published 2015“…Bubble size distribution which is regarded as the most important characteristics of froth structure, is being addressed in this thesis by using a segmentation algorithm. A marker based watershed algorithm had been adopted and improved so as to prevent the over segmentation of big bubbles and able to adapt itself with different scenario of froth images. …”
Get full text
Get full text
Thesis -
17
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018“…The test MSE value is used to evaluate the performance of NN and validation MSE value is used to prevent overfitting. The weights and biases generated through the training process is depended on the training algorithm, initial weights and biases for training and the dataset used in the process. …”
Get full text
Get full text
Monograph -
18
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…Besides that, this algorithm also prevents tracking loss due to object color appears in the background.…”
Get full text
Get full text
Get full text
Article -
20
Real-time moving objects tracking for distributed smart video surveillances
Published 2016“…The proposed algorithm was formulated based on visual and temporal cues for multiple cameras using entering/exiting and merging/splitting cases to deal with appearance changes and occlusion problems. …”
Get full text
Get full text
Get full text
Get full text
Article
