Search Results - object ((((electron algorithm) OR (selection algorithm))) OR (detection algorithm))
Search alternatives:
-
1
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…Subsequently, Canny edge detection algorithm is selected as an efficient algorithm based on the comparison made and it is further used in this project. …”
Get full text
Get full text
Final Year Project -
2
The fusion of edge detection and mathematical morphology algorithm for shape boundary recognition
Published 2016“…To address this problem, this paper proposes a fusion of selected edge detection algorithms with mathematical morphology to enhance the ability to detect the object shape boundary. …”
Get full text
Get full text
Get full text
Article -
3
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005“…Clustering-based intrusion detection algorithm which trains on unlabeled data in order to detect new intrusions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Maldroid- attribute selection analysis for malware classification
Published 2019“…Moreover, in order to get the best combination between attribute selection and classification algorithm, eight attributes selection and seven categories machine learning algorithm are applied in this study. …”
Get full text
Get full text
Get full text
Article -
5
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has developed an improved edge detection and contour segmentation algorithm that is able to correctly segment various objects from both indoor and outdoor images. …”
Get full text
Get full text
Thesis -
6
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009“…This algorithm can detect weeds and also classify it. Currently the algorithm is tested on two types of weeds i.e. broad and narrow. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…Furthermore, colour threshold analysis and edge detection algorithms are redesigned exclusively to refine the two-dimensional coefficients into a more meaningful low-level representation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…The classifier, named as HADMLP is trained using a hybridization of the artificial bee colony along with the dragonfly algorithm. A multi-objective artificial bee colony model which is wrapper-based is used for selection of feature. …”
Get full text
Get full text
Conference or Workshop Item -
10
Moving detection using cellular neural network (CNN)
Published 2008“…These templates are combined to create the most ideal algorithm to detect a moving object in an image. A video of a bouncing ball is recorded using a static camera. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Metacarpal phantom radiograph edge detection using genetic algorithm gradient based genotype / Norharyati Md Ariff
Published 2007“…Genetic algorithms have several steps. For the initial population, 200 pixels will be taken to be the initial population in randomly. …”
Get full text
Get full text
Thesis -
12
Stereo Matching Based On Absolute Differences For Multiple Objects Detection
Published 2019“…This article presents a new algorithm for object detection using stereo camera system. …”
Get full text
Get full text
Get full text
Article -
13
Vehicle speed detection using frame differencing for smart surveillance system
Published 2011Get full text
Working Paper -
14
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
Published 2020“…This research designed an anomaly-based detection, by adopting the modified Cuckoo Search Algorithm (CSA), called Mutation Cuckoo Fuzzy (MCF) for feature selection and Evolutionary Neural Network (ENN) for classification. …”
Get full text
Get full text
Get full text
Article -
15
Improvement of Auto-Tracking Mobile Robot based on HSI Color Model
Published 2018“…Besides that, this algorithm also prevents tracking loss due to object color appears in the background.…”
Get full text
Get full text
Get full text
Article -
16
Quality inspection of engraved image using based matching approach
Published 2011“…This experiment result shows that the algorithm works better with detection rate of 100% and matching accuracy of more than 98%. …”
Get full text
Get full text
Conference or Workshop Item -
17
Multilocal feature selection using genetic algorithm for face identification
Published 2008“…Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. …”
Get full text
Get full text
Get full text
Article -
18
Hybrid Region Merging For Image Segmentation Using Optimal Global Feature With Global Merging Criterion Approach
Published 2020“…Besides that, improper selection of global feature information by partitional clustering algorithm in turn affects the merging criterion derivation in region merging eventually causing leakages into adjacent visual object regions. …”
Get full text
Get full text
Thesis -
19
Tracking consistency metric for video surveillance tracking
Published 2009“…These metrics give a measure of the ability of a tracking algorithm to correctly detect or track a target object. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Database encryption for a Web-based Claims System
Published 2008“…Testing was also done on the encryption algorithms and Web browsers selected by increasing both the text length size and key length size and observed its performances. …”
Get full text
Thesis
