Search Results - (( based detection method algorithm ) OR ( program visualization system algorithm ))
Search alternatives:
- visualization system »
- method algorithm »
- system algorithm »
- based detection »
-
1
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
3
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
4
OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People
Published 2012“…To leverage on previous research of Signage Recognition Framework which could only recognize public signage with slanted angle less than , an improved OCR signage recognition model with skew and slant correction in public signage is presented. The proposed OCR method consists of Canny edge detection algorithm, Hough Transformation and Shearing Transformation were used to detect and correct skewed and slanted images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
OCR Signage Recognition with Skew & Slant Correction For Visually Impaired People
Published 2011“…To leverage on previous research of Signage Recognition Framework which could only recognize public signage with slanted angle less than , an improved OCR signage recognition model with skew and slant correction in public signage is presented. The proposed OCR method consists of Canny edge detection algorithm, Hough Transformation and Shearing Transformation were used to detect and correct skewed and slanted images. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Moving detection using cellular neural network (CNN)
Published 2008“…Detecting moving objects is a key component of an automatic visual surveillance and tracking system. …”
Get full text
Get full text
Undergraduates Project Papers -
7
The application of Hough Transform for corner detection
Published 2006“…Mean while, the Zhang Suen Thinning Method can be used to reduce the edge points into minima points to speed up the algorithm. …”
Get full text
Get full text
Thesis -
8
Parallel system for abnormal cell growth prediction based on fast numerical simulation
Published 2010“…The paper focuses on a numerical method for detecting, visualizing and monitoring abnormal cell growth using large-scale mathematical simulations. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Image processing on intel edison microcontroller for pork detection
Published 2016“…Recently, the researchers have demonstrated that it is essential to develop inexpensive, and reliable methods to support halal food detection systems. Hence, detecting pork meat cheating in beef and chicken meatballs visually has been researched by using gold nanoparticles (GNPs) which changes the color of pork DNA samples into a clearly remarkable color. …”
Get full text
Get full text
Thesis -
10
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…This research demonstrates a new algorithmic method of moderating emotional content within Chinese dating reality shows based on cross-media analysis, combining text, audio, video, and social media feedback. …”
Get full text
Get full text
Article -
11
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…It can be concluded from this research that proposed system employed the power of simple methods that are less resource-hungry yet provide better results.…”
Get full text
Get full text
Get full text
Article -
12
Translating medical image to radiological report: Adaptive multilevel multi-attention approach
Published 2022“…The AMLMA employs a weighted multilevel association of adaptive visual-semantic attention and visual-based linguistic attention mechanisms. …”
Get full text
Get full text
Article -
13
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…In order to process and simulate a tomography system, it has been found that Visual C++ programming has an advantage one step ahead compared to Visual Basic programming. …”
Get full text
Get full text
Get full text
Article -
14
Risk assessment of dengue in Betong Sarawak using simple mathematical model
Published 2020Get full text
Get full text
Student Project -
15
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017“…The main contribution of the paper is to introduce a dynamic programming algorithm, which defines an optimal policy for solving the visual sensor coverage problem. …”
Get full text
Get full text
Article -
16
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…With Windows as the operating system and the C# programming language in Visual Studio 2019, the program complies with the Extreme Programming (XP) software development method. …”
Get full text
Get full text
Get full text
Article -
17
Ray Casting for Iso-surface in Volumetric Data
Published 2005“…It can be applied in many areas such as medical, oil and gas exploration, etc... Although volume visualization is highly computational cost, there is a vision of real time volumetric visualization systems based on interactive ray tracing. …”
Get full text
Get full text
Final Year Project -
18
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This paper highlights the various edge detection algorithms working method and comparison is made based on the advantages and disadvantages of the algorithms for the identification of an optimum edge detection algorithm. …”
Get full text
Get full text
Final Year Project -
19
Machine learning algorithms in context of intrusion detection
Published 2016“…Asymmetrically, anomaly based detection method can detect novel attacks but it has high false positive rate. …”
Get full text
Get full text
Conference or Workshop Item -
20
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
